You are viewing a plain text version of this content. The canonical link for it is here.
Posted to builds@solr.apache.org by Apache Jenkins Server <je...@builds.apache.org> on 2023/10/14 03:41:41 UTC

[JENKINS] Solr » Solr-check-9.4 - Build # 818 - Still Failing!

Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/818/

All tests passed

Build Log:
[...truncated 1164 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196512ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 4549ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-14 03:28:47.749; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:28:48.904; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 2318ms
not ok 8 accept d option with builtin config in 2465ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-14 03:28:53.706; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:28:53.763; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2438ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-14 03:28:56.163; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:28:56.215; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 4669ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-14 03:28:58.634; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:29:00.905; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2468ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-14 03:29:03.341; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:29:03.395; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 4549ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-14 03:29:05.707; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:29:07.965; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 4590ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-14 03:29:10.361; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:29:12.617; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3376ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-14 03:29:21.223; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:29:21.275; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2378ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-14 03:29:23.587; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:29:23.659; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2366ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-14 03:29:26.013; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:29:26.070; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2271ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-14 03:29:28.316; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:29:28.369; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 26479ms
ok 19 Check export command in 24123ms
ok 20 export fails on non cloud mode in 8639ms
not ok 21 using curl to extract a single pdf file in 8440ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 37695 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37695 (pid=25152). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-14 03:30:36.250; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:30:36.307; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 11098ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 37695 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37695 (pid=25625). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-14 03:30:45.144; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:30:47.401; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 12697ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 37695 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37695 (pid=26081). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-14 03:30:55.687; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:31:00.148; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30269ms
ok 25 start help flag prints help in 172ms
ok 26 stop help flag prints help in 167ms
ok 27 restart help flag prints help in 176ms
ok 28 status help flag prints help in 55ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 167ms
ok 30 create help flag prints help in 169ms
ok 31 createcore help flag prints help in 168ms
ok 32 createcollection help flag prints help in 169ms
ok 33 delete help flag prints help in 187ms
ok 34 version help flag prints help in 56ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 175ms
ok 36 auth help flag prints help in 170ms
ok 37 assert help flag prints help in 972ms
ok 38 post help flag prints help in 969ms
not ok 39 SQL Module in 10357ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:37695/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-14 03:31:45.018; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:31:45.071; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:37695/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 24676ms
not ok 41 icu collation in analysis-extras module in 8815ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-14 03:32:18.550; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:32:18.606; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1330ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 32604 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 32604 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10028ms
not ok 44 deploying and undeploying a collection level package in 196513ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 37695 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37695 (pid=30293). Happy searching!
#
#     
ok 45 Affinity placement plugin using sysprop in 19292ms
not ok 46 Random placement plugin using ENV in 12634ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-14 03:36:16.381; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:36:17.538; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-14 03:36:18.568; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:36:18.633; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 4165ms
not ok 48 basic post with a type specified in 1388ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1236ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1284ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1265ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1365ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1368ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1343ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 4781ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-14 03:36:46.390; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:36:47.548; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2407ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-14 03:36:49.950; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 03:36:50.006; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 57 allowPaths - backup in 16716ms
ok 58 start solr with ssl in 18649ms
ok 59 use different hostname when not checking peer-name in 31153ms
ok 60 start solr with ssl and auth in 17224ms
ok 61 start solr with client truststore and security manager in 19366ms
ok 62 start solr with mTLS needed in 67086ms
not ok 63 start solr with mTLS wanted in 39533ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 475)
#   `assert_output --partial "Created collection 'test'"' failed
# /tmp/bats-run-ef51g1/test/63/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 37695 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37695 (pid=10539). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 37696 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37696 (pid=10651). Happy searching!
#
#     INFO  - 2023-10-14 03:40:04.951; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 03:40:04.957; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 03:40:05.337; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-ef51g1/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ef51g1/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 03:40:05.339; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-ef51g1/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ef51g1/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 03:40:05.339; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(ca,h=[localhost],a=[],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-ef51g1/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ef51g1/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 03:40:05.378 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "17 B8 CC 49",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 03:39:52.000 UTC",
#     "not  after"         : "2024-01-12 03:39:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 08 B6 07 3E 3B DF 21   3C BD 86 62 EF F0 13 EB  4...>;.!<..b....
#         0010: 3D 2B 62 BE                                        =+b.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 26 9F 8A CC CC 77 EC   33 93 67 EF 73 BB EC 9A  .&....w.3.g.s...
#         0010: AF 00 FE 4B                                        ...K
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 03:40:05.382 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C E4 8A 39",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 03:39:43.000 UTC",
#     "not  after"         : "2024-01-12 03:39:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 0D 3B D9 C3 4B 50 8C   F6 0D 2E 63 40 1E FC 1E  G.;..KP....c@...
#         0010: 6B C7 68 DF                                        k.h.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 3A 47 66",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 03:39:45.000 UTC",
#     "not  after"         : "2024-01-12 03:39:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 0D 3B D9 C3 4B 50 8C   F6 0D 2E 63 40 1E FC 1E  G.;..KP....c@...
#         0010: 6B C7 68 DF                                        k.h.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 08 B6 07 3E 3B DF 21   3C BD 86 62 EF F0 13 EB  4...>;.!<..b....
#         0010: 3D 2B 62 BE                                        =+b.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 03:40:05.395 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 03:40:05.828 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 03:40:05.828 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 03:40:05.830 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 03:40:05.830 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 03:40:05.837 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 03:40:05.852 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 03:40:05.852 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 03:40:05.853 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 03:40:05.855 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "63 E2 AA CF 68 17 17 49 7F 42 57 1D 87 41 1B A5 20 43 30 4B B8 7E 15 03 5F 51 98 B9 35 B7 77 BA",
#   "session id"          : "D7 1C 31 B2 BC 85 76 1E 48 7E 8F 7A E9 95 0D 53 A1 49 E3 07 C3 B2 45 2F FE CA 7C 0D E4 3B 9A 50",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 48 4B D4 84 26 0C 06 B0   4F 92 E5 02 B1 7A 05 02  HK..&...O....z..
#             0010: 0D B9 57 84 B0 11 EE 25   54 C1 48 11 9F 04 7A 3F  ..W....%T.H...z?
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.001 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "51 E9 BB 51 D0 B8 36 79 74 19 57 4D EC CE 78 D9 73 47 59 1A 12 B3 40 AC 34 CC 0C 8B F9 89 C9 F6",
#   "session id"          : "D7 1C 31 B2 BC 85 76 1E 48 7E 8F 7A E9 95 0D 53 A1 49 E3 07 C3 B2 45 2F FE CA 7C 0D E4 3B 9A 50",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E4 83 3D C1 87 49 21 9A   8D DB 60 61 CC 0C 05 6B  ..=..I!...`a...k
#           0010: A6 C0 D9 46 88 7E B2 86   9C D3 5E 4E D9 AD F5 40  ...F......^N...@
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.001 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.003 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.005 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.005 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.006 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.006 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.007 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.007 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.007 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.010 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.019 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.019 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.019 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.026 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.026 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.026 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.026 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.027 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.027 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.027 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 03:40:06.027 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 03:40:06.027 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.027 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.027 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.060 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.064 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.072 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.089 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.089 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.089 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.090 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.090 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 03:40:06.090 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 03:40:06.090 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.091 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.091 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.092 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.092 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.093 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.093 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 03:40:06.093 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.102 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B AD 87 DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 03:39:48.000 UTC",
#       "not  after"         : "2024-01-12 03:39:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 08 B6 07 3E 3B DF 21   3C BD 86 62 EF F0 13 EB  4...>;.!<..b....
#           0010: 3D 2B 62 BE                                        =+b.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 30 DD A2 9B 20 A8 D1 04   19 B9 47 36 BC 7C 6A 15  0... .....G6..j.
#           0010: 9E E5 71 78                                        ..qx
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.103 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.196 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 3A 47 66",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 03:39:45.000 UTC",
#     "not  after"         : "2024-01-12 03:39:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 0D 3B D9 C3 4B 50 8C   F6 0D 2E 63 40 1E FC 1E  G.;..KP....c@...
#         0010: 6B C7 68 DF                                        k.h.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 08 B6 07 3E 3B DF 21   3C BD 86 62 EF F0 13 EB  4...>;.!<..b....
#         0010: 3D 2B 62 BE                                        =+b.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.199 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9D F1 C8 2A D1 D9 8E 5F   44 5D 7F 78 DC 6A 1D B4  ...*..._D].x.j..
#     0010: 27 36 42 37 BD 74 30 93   A5 34 98 02 DF 8F D0 A1  '6B7.t0..4......
#     0020: C2 F3 9E 3B FC C4 20 7B   23 11 2C 69 FC 72 46 7D  ...;.. .#.,i.rF.
#     0030: 7F D6 C9 E1 43 04 8F 5A   20 75 16 2D 8E 33 62 3D  ....C..Z u.-.3b=
#     0040: E4 B0 8D C0 6B E3 01 38   C7 79 BF EB 42 D2 33 F9  ....k..8.y..B.3.
#     0050: E6 E7 EE 83 27 04 06 9E   6F E2 BA 02 41 A9 02 3C  ....'...o...A..<
#     0060: 59 5A DC D3 6F 79 CA B8   33 AF FE D9 ED 31 BA A5  YZ..oy..3....1..
#     0070: 8B 32 2E 82 97 C3 C9 A3   AC CF 5F B2 F9 4E 72 C6  .2........_..Nr.
#     0080: 21 20 44 94 99 6F F9 33   9E 72 FA 95 C0 01 A1 0A  ! D..o.3.r......
#     0090: 5F 06 91 9C 0D 43 A2 00   F7 6F A7 99 08 3A 42 4A  _....C...o...:BJ
#     00A0: F3 E9 EC 69 8C 29 BF E9   A4 EE 22 B7 D6 51 4A C0  ...i.)...."..QJ.
#     00B0: C5 29 F0 30 63 CF 4F C9   B8 2D 67 22 E3 EC 25 EC  .).0c.O..-g"..%.
#     00C0: 25 D1 CE 12 3F BA 07 55   6F ED 8B A4 3B 2E AB 35  %...?..Uo...;..5
#     00D0: C1 7E CB 64 21 D4 E5 8E   19 DB 61 0C E4 D8 49 8B  ...d!.....a...I.
#     00E0: 96 BD 87 59 FF 80 91 9B   B8 17 3D 90 D0 9D 5C 60  ...Y......=...\`
#     00F0: 26 79 72 67 87 85 84 71   96 67 E5 2F 36 86 B6 08  &yrg...q.g./6...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.204 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 13 1F 6C 62 34 5E 49 94   3F 16 A7 AE 4E BF 38 C1  ..lb4^I.?...N.8.
#     0010: BD 9D EA 00 A8 46 83 74   F1 FB A4 82 FC 9E B4 B0  .....F.t........
#     0020: C0 2D 80 69 FF 9E C8 B9   83 D2 2C 90 52 79 6C B0  .-.i......,.Ryl.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.206 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 03:40:06.207 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 03:40:06.207 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 03:40:06.214 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 03:40:06.214 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 03:40:06.215 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 03:40:06.215 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.215 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.220 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "17 B8 CC 49",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 03:39:52.000 UTC",
#       "not  after"         : "2024-01-12 03:39:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 08 B6 07 3E 3B DF 21   3C BD 86 62 EF F0 13 EB  4...>;.!<..b....
#           0010: 3D 2B 62 BE                                        =+b.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 26 9F 8A CC CC 77 EC   33 93 67 EF 73 BB EC 9A  .&....w.3.g.s...
#           0010: AF 00 FE 4B                                        ...K
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.266 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 15 C9 C5 6A 8E 13 E4 91   01 01 D5 0A 57 6B 07 68  ...j........Wk.h
#     0010: 3B 94 C4 BD A2 95 A4 54   B7 B1 6A 91 5B EE 9B DD  ;......T..j.[...
#     0020: 84 EB F4 CF E2 8F 10 D6   73 E5 A5 CA C6 6F E6 F1  ........s....o..
#     0030: 5A B7 70 48 57 F9 2E 50   20 80 34 21 97 7B 5A 13  Z.pHW..P .4!..Z.
#     0040: DC 0A A5 92 E9 5B 14 AD   C3 72 CB A3 16 0B 46 E6  .....[...r....F.
#     0050: 57 83 81 3F E1 66 1D 90   60 93 94 D0 24 49 67 A1  W..?.f..`...$Ig.
#     0060: 77 D5 C1 B7 87 C0 6C 14   22 40 8C B4 A0 93 3F 5E  w.....l."@....?^
#     0070: 49 B4 91 9F 23 65 37 F0   50 4E 7E F4 1D DC 8C 61  I...#e7.PN.....a
#     0080: 1C 81 4A 21 B0 D9 07 E9   F9 70 71 4A 7D A9 57 C5  ..J!.....pqJ..W.
#     0090: F9 10 46 0E 2B DB B8 3B   BB B9 4E D9 0B 0A 33 DA  ..F.+..;..N...3.
#     00A0: 37 04 EB BF 5E 36 51 AF   2A CF 76 DC 80 01 47 80  7...^6Q.*.v...G.
#     00B0: 62 1A 0C 9B E9 62 23 A6   FE 96 E8 57 CA DD BC 80  b....b#....W....
#     00C0: 82 57 A5 9F A5 1F 59 74   FC D7 33 FE 72 E4 AE EE  .W....Yt..3.r...
#     00D0: 45 E7 AB 6A A5 35 FE 8A   48 76 6B AB 0C AE 52 25  E..j.5..Hvk...R%
#     00E0: 0F 1A FD 38 22 C0 D1 52   3F 4A 42 D5 6A E2 3C 81  ...8"..R?JB.j.<.
#     00F0: 21 E4 3C FF DB 60 10 C0   A2 A2 17 2E B5 F2 C8 54  !.<..`.........T
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.269 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 32 1B 7E A7 0E 0E C3 28   4B 8E C2 C6 04 4A A4 3B  2......(K....J.;
#     0010: 16 B9 01 8A C8 3A 94 C4   05 AA 12 E0 1D A9 A9 D1  .....:..........
#     0020: 0D 7E F8 03 3C 7D 90 F7   CC 65 50 88 30 24 82 05  ....<....eP.0$..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:06.273 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-14 03:40:06.407 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "4C F8 58 58 FF E4 0E FA 9D 18 F9 EB 7B 9F 9D EC 2D 86 DC 45 F1 C1 DA B9 08 BF 8D 85 DD CE 6D 0D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 03:40:07.128 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 03:40:07.129 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-14 03:40:07.132 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-14 03:40:08.950; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 03:40:08.954; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 03:40:09.319; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-ef51g1/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ef51g1/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 03:40:09.321; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-ef51g1/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ef51g1/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 03:40:09.322; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5b970f7(ca,h=[localhost],a=[],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-ef51g1/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ef51g1/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 03:40:09.362 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "17 B8 CC 49",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 03:39:52.000 UTC",
#     "not  after"         : "2024-01-12 03:39:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 08 B6 07 3E 3B DF 21   3C BD 86 62 EF F0 13 EB  4...>;.!<..b....
#         0010: 3D 2B 62 BE                                        =+b.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 26 9F 8A CC CC 77 EC   33 93 67 EF 73 BB EC 9A  .&....w.3.g.s...
#         0010: AF 00 FE 4B                                        ...K
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 03:40:09.367 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C E4 8A 39",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 03:39:43.000 UTC",
#     "not  after"         : "2024-01-12 03:39:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 0D 3B D9 C3 4B 50 8C   F6 0D 2E 63 40 1E FC 1E  G.;..KP....c@...
#         0010: 6B C7 68 DF                                        k.h.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 3A 47 66",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 03:39:45.000 UTC",
#     "not  after"         : "2024-01-12 03:39:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 0D 3B D9 C3 4B 50 8C   F6 0D 2E 63 40 1E FC 1E  G.;..KP....c@...
#         0010: 6B C7 68 DF                                        k.h.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 08 B6 07 3E 3B DF 21   3C BD 86 62 EF F0 13 EB  4...>;.!<..b....
#         0010: 3D 2B 62 BE                                        =+b.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 03:40:09.378 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 03:40:09.523 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 03:40:09.523 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 03:40:09.525 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 03:40:09.525 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 03:40:09.529 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 03:40:09.539 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 03:40:09.539 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 03:40:09.539 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 03:40:09.541 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D1 5F 31 CD 66 37 F3 69 9B 70 96 38 9A B6 83 B1 5F 25 A6 5F D0 6F F2 ED 7F A1 22 E3 E7 C2 5B 3A",
#   "session id"          : "F2 88 9B DC B6 F1 54 3B 2D 01 CB 43 51 9D C8 D3 D7 7D C4 DD 05 29 95 A6 03 69 D7 75 6D 5B 40 E4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 29 38 F9 57 31 A3 78 E0   77 DE 38 2F 1E 6E 44 91  )8.W1.x.w.8/.nD.
#             0010: B9 79 B9 5F 56 24 E4 18   9F 1D 26 A4 59 63 58 52  .y._V$....&.YcXR
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.631 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8D A3 E6 C9 30 49 0F 0F F5 0C D6 8A E7 B9 4C 03 EA B1 3A 7D 88 0E 4C 78 05 80 43 CE D0 AC 14 35",
#   "session id"          : "F2 88 9B DC B6 F1 54 3B 2D 01 CB 43 51 9D C8 D3 D7 7D C4 DD 05 29 95 A6 03 69 D7 75 6D 5B 40 E4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 9E 06 D3 83 19 AD 8E 2C   AB BF C5 04 03 EC 47 2A  .......,......G*
#           0010: E4 06 A4 DF 79 21 5D C4   DC 1D 10 96 4F 9C 25 0C  ....y!].....O.%.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.631 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.631 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.635 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.635 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.635 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.635 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.636 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.636 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.636 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.636 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.640 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.640 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.640 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 03:40:09.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 03:40:09.641 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 03:40:09.641 UTC|SSLExtensions.java:215|Ignore impact of unsupported

[...truncated too long message...]


#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 03:40:13.706 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C E4 8A 39",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 03:39:43.000 UTC",
#     "not  after"         : "2024-01-12 03:39:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 0D 3B D9 C3 4B 50 8C   F6 0D 2E 63 40 1E FC 1E  G.;..KP....c@...
#         0010: 6B C7 68 DF                                        k.h.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 3A 47 66",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 03:39:45.000 UTC",
#     "not  after"         : "2024-01-12 03:39:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 0D 3B D9 C3 4B 50 8C   F6 0D 2E 63 40 1E FC 1E  G.;..KP....c@...
#         0010: 6B C7 68 DF                                        k.h.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 08 B6 07 3E 3B DF 21   3C BD 86 62 EF F0 13 EB  4...>;.!<..b....
#         0010: 3D 2B 62 BE                                        =+b.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 03:40:13.717 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14413ms
ok 65 stop command for single port in 17399ms
not ok 66 status detects locally running solr in 3720ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 32604 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 30904 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20031 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 32604 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 30904 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20031 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 253ms
ok 68 listing out files in 3906ms
ok 69 copying files around in 8646ms
ok 70 upconfig in 2816ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1221ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1209ms
not ok 73 Cleanup in 4794ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 32604 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 30904 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20031 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 32604 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 30904 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20031 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 6m 5s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/wgfunnrjt5xvu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 895 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/895/

All tests passed

Build Log:
[...truncated 1227 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42539/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-27 04:25:30.633; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 04:25:30.638; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-27 04:25:31.420; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 04:25:31.456; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 16815ms
ok 61 start solr with client truststore and security manager in 19494ms
not ok 62 start solr with mTLS needed in 51044ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-RlaxiP/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 42539 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42539 (pid=2835244). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 42540 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 42540 (pid=2835355). Happy searching!
#
#     INFO  - 2023-10-27 04:26:33.194; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 04:26:33.199; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 04:26:33.926; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@c7a975a(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-RlaxiP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RlaxiP/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 04:26:33.932; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-RlaxiP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RlaxiP/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 04:26:33.934; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(ca,h=[localhost],a=[],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-RlaxiP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RlaxiP/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 04:26:33.998 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F E8 83 F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 04:26:19.000 UTC",
#     "not  after"         : "2024-01-25 04:26:19.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#         0010: 09 B3 44 48                                        ..DH
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 C1 29 72 8A A8 9C 96   63 55 67 66 0E 1F CC 6E  (.)r....cUgf...n
#         0010: D3 29 F1 19                                        .)..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A DB 00 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 04:26:12.000 UTC",
#     "not  after"         : "2024-01-25 04:26:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A2 1E FE 19 7E A6 5B   18 E9 8E D0 A2 9A 26 59  .......[......&Y
#         0010: FE 52 60 44                                        .R`D
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#         0010: 09 B3 44 48                                        ..DH
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 04:26:34.003 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 5B 18 B6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 04:26:10.000 UTC",
#     "not  after"         : "2024-01-25 04:26:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A2 1E FE 19 7E A6 5B   18 E9 8E D0 A2 9A 26 59  .......[......&Y
#         0010: FE 52 60 44                                        .R`D
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A DB 00 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 04:26:12.000 UTC",
#     "not  after"         : "2024-01-25 04:26:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A2 1E FE 19 7E A6 5B   18 E9 8E D0 A2 9A 26 59  .......[......&Y
#         0010: FE 52 60 44                                        .R`D
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#         0010: 09 B3 44 48                                        ..DH
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 04:26:34.028 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 04:26:34.529 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:34.529 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 04:26:34.531 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 04:26:34.531 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:34.542 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:34.570 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:34.571 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:34.571 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:34.573 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EF C7 39 2D 0B 75 2E DA 6D 73 DC 06 CB 8D E2 E0 C5 16 B7 E7 C9 0A 1D DF D4 FE 85 EE B0 4D 72 E3",
#   "session id"          : "32 21 28 EE 7B E4 0E 19 3B 9A 57 5E B6 16 61 A4 34 F5 34 14 C1 C6 DC E0 7C 9B 01 5F 7C 82 97 91",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 59 95 12 BB F6 73 D1 BC   4A 9A EB CB C2 AA BE 47  Y....s..J......G
#             0010: C9 B4 E6 1B 4E 1D 6C 0C   2C 97 0C AC E8 2E 42 03  ....N.l.,.....B.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.717 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "12 E3 A8 65 71 C2 85 5F C9 DB D7 4C 05 E3 54 A4 DC 62 81 EE FD 35 24 F5 32 04 57 BE 4B 7A 85 82",
#   "session id"          : "32 21 28 EE 7B E4 0E 19 3B 9A 57 5E B6 16 61 A4 34 F5 34 14 C1 C6 DC E0 7C 9B 01 5F 7C 82 97 91",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 7D 86 CB DD 01 CE 2B F5   92 52 4B C5 1F D4 B6 20  ......+..RK....
#           0010: B1 A8 33 83 0C 3B 7D FE   B8 8F 14 9B E1 AE 93 76  ..3..;.........v
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.717 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.717 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.719 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.721 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.721 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:34.722 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:34.722 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:34.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.158 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.163 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.165 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.174 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.175 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.175 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.175 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.176 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.176 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.177 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:35.177 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:35.177 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.179 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.180 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.180 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.183 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.196 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.197 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:35.197 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.201 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 8E 50 79",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 04:26:15.000 UTC",
#       "not  after"         : "2024-01-25 04:26:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#           0010: 09 B3 44 48                                        ..DH
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 32 22 3D 5D 1E D1 81   01 99 6D A9 96 5B 04 83  .2"=].....m..[..
#           0010: 7D DC 32 DC                                        ..2.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.201 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 04:26:35.303 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 04:26:35.308 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 04:26:35.308 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 04:26:35.308 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.349 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A DB 00 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 04:26:12.000 UTC",
#     "not  after"         : "2024-01-25 04:26:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A2 1E FE 19 7E A6 5B   18 E9 8E D0 A2 9A 26 59  .......[......&Y
#         0010: FE 52 60 44                                        .R`D
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#         0010: 09 B3 44 48                                        ..DH
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.359 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 62 C4 32 AB 67 1E 9F 95   50 19 0D 02 00 75 33 02  b.2.g...P....u3.
#     0010: CB 4C AE 74 65 42 F9 44   BA B6 24 B4 F7 63 F0 37  .L.teB.D..$..c.7
#     0020: FB 75 BF 90 41 FA B9 07   EF B9 B5 58 83 D3 21 4C  .u..A......X..!L
#     0030: FB 2F 0F CD 93 92 48 63   F5 09 E2 64 70 10 F3 B4  ./....Hc...dp...
#     0040: EA DC 76 72 3C B3 0D 7E   30 EE 12 A5 63 8C DA 12  ..vr<...0...c...
#     0050: 7F 10 E2 3B 13 F3 CC C4   59 FE 3A 21 DD E6 20 F9  ...;....Y.:!.. .
#     0060: 49 7A 1A DB 05 5B AE B5   F2 D5 4B 19 75 1A DF E9  Iz...[....K.u...
#     0070: 03 A4 80 FC 7B B5 11 60   CA 05 6A 07 C3 6A 67 8C  .......`..j..jg.
#     0080: 1F DB E0 79 2A 1F 85 17   8C 82 22 AB 86 19 DB D2  ...y*.....".....
#     0090: 44 7F D0 9E 4C B3 7B F4   2A B1 D8 EC 70 8B D8 5A  D...L...*...p..Z
#     00A0: 94 35 32 58 A0 DE 8D 65   A9 F7 20 96 05 C8 0E 41  .52X...e.. ....A
#     00B0: 3A 09 04 FC 69 39 17 DE   90 C4 AC B2 9F AB B9 3D  :...i9.........=
#     00C0: B9 4D 99 2E 3B 10 D5 99   D7 52 FA C1 A7 F3 76 88  .M..;....R....v.
#     00D0: DC CE CD A4 27 3E 63 7C   DB 85 47 58 24 19 23 24  ....'>c...GX$.#$
#     00E0: E4 B4 EC DA 03 37 F2 50   C2 3A AB 98 CF 0F 2F DE  .....7.P.:..../.
#     00F0: 1D 62 86 76 AC A8 5F 97   4A E5 65 FE D5 E4 FF 9B  .b.v.._.J.e.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.361 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 98 F3 55 E8 92 7A 45 9A   89 FC FB CC 46 4D E8 B9  ..U..zE.....FM..
#     0010: 57 4B 45 06 F3 65 2E 02   42 A5 94 1C 72 A2 53 64  WKE..e..B...r.Sd
#     0020: F6 45 31 0B 39 98 06 66   E9 04 42 2A 12 2C CA D4  .E1.9..f..B*.,..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.368 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 04:26:35.379 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:35.379 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 04:26:35.380 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:35.380 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 04:26:35.380 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:35.380 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.380 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.385 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F E8 83 F1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 04:26:19.000 UTC",
#       "not  after"         : "2024-01-25 04:26:19.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#           0010: 09 B3 44 48                                        ..DH
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 C1 29 72 8A A8 9C 96   63 55 67 66 0E 1F CC 6E  (.)r....cUgf...n
#           0010: D3 29 F1 19                                        .)..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A DB 00 75",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 04:26:12.000 UTC",
#       "not  after"         : "2024-01-25 04:26:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 A2 1E FE 19 7E A6 5B   18 E9 8E D0 A2 9A 26 59  .......[......&Y
#           0010: FE 52 60 44                                        .R`D
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#           0010: 09 B3 44 48                                        ..DH
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.410 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2A 46 0F 1A C4 DC 77 83   D0 5B 1F 77 EB A0 AD F5  *F....w..[.w....
#     0010: 87 B5 9D 33 F3 C6 BA 14   6B AA F2 9A BE 8B 9E 05  ...3....k.......
#     0020: 56 EF 9B 4C 47 69 C3 E6   DA 69 4D 9A EA 36 10 6F  V..LGi...iM..6.o
#     0030: 4C 90 22 8F 01 72 B7 81   51 68 AF 96 EB A3 3C 65  L."..r..Qh....<e
#     0040: 46 90 1B 71 1E 8D 08 E3   C4 7A 0D D8 C5 46 AC 44  F..q.....z...F.D
#     0050: E2 96 08 BD 76 DA B4 FE   7F FD D5 BF C7 61 23 93  ....v........a#.
#     0060: AB 88 BA 79 49 3B 43 77   B1 57 00 86 CA 7F 6B 39  ...yI;Cw.W....k9
#     0070: 98 9F 09 84 FF 15 6A C7   34 04 19 42 7F 1F 53 9D  ......j.4..B..S.
#     0080: CE 23 E6 FF FE 82 CE AA   78 EB 34 9D AA 8F 26 E4  .#......x.4...&.
#     0090: 91 3A 7E C6 A6 0C AE E2   46 5A C1 2A 15 DE 07 DD  .:......FZ.*....
#     00A0: 75 70 47 F4 FE 43 D4 67   D2 93 A6 AE 3A C6 C6 27  upG..C.g....:..'
#     00B0: 5A 05 D0 9E D5 F7 28 CC   B8 89 D1 3E A9 8F 1A AE  Z.....(....>....
#     00C0: 03 BE EC 84 83 5C 54 31   6F E6 26 CE 23 FA 88 3A  .....\T1o.&.#..:
#     00D0: 07 A5 45 D4 B4 79 49 5C   3A 9E C1 80 22 D5 61 B9  ..E..yI\:...".a.
#     00E0: E7 F1 EC AD AE A9 F3 DC   9F 75 C9 5B 52 1C DA 87  .........u.[R...
#     00F0: F2 53 B4 C3 AE 13 6B 69   50 97 FF 02 32 18 F5 9C  .S....kiP...2...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.411 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 00 5E 9D 91 4D EA FB FB   3D F3 25 0F 5B 59 81 44  .^..M...=.%.[Y.D
#     0010: 33 B5 D6 FB 74 02 33 CA   5D 43 A7 B8 33 E9 BE 5E  3...t.3.]C..3..^
#     0020: 5F 89 DA 43 1B 70 9F B4   81 90 23 73 B7 A9 5E BD  _..C.p....#s..^.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.412 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:35.479 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A6 F2 3F D4 64 77 74 05 3E 79 F2 EA EC 8E D6 AF 2E DC C8 FB BB 5C 44 3E A1 5C FC 96 05 8C F6 D4",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 04:26:35.828 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 04:26:35.829 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 04:26:37.380; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 04:26:37.384; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 04:26:38.094; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-RlaxiP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RlaxiP/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 04:26:38.096; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@165b8a71(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-RlaxiP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RlaxiP/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 04:26:38.097; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6175619b(ca,h=[localhost],a=[],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-RlaxiP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RlaxiP/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 04:26:38.129 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F E8 83 F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 04:26:19.000 UTC",
#     "not  after"         : "2024-01-25 04:26:19.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#         0010: 09 B3 44 48                                        ..DH
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 C1 29 72 8A A8 9C 96   63 55 67 66 0E 1F CC 6E  (.)r....cUgf...n
#         0010: D3 29 F1 19                                        .)..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A DB 00 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 04:26:12.000 UTC",
#     "not  after"         : "2024-01-25 04:26:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A2 1E FE 19 7E A6 5B   18 E9 8E D0 A2 9A 26 59  .......[......&Y
#         0010: FE 52 60 44                                        .R`D
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#         0010: 09 B3 44 48                                        ..DH
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 04:26:38.132 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 5B 18 B6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 04:26:10.000 UTC",
#     "not  after"         : "2024-01-25 04:26:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A2 1E FE 19 7E A6 5B   18 E9 8E D0 A2 9A 26 59  .......[......&Y
#         0010: FE 52 60 44                                        .R`D
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A DB 00 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 04:26:12.000 UTC",
#     "not  after"         : "2024-01-25 04:26:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A2 1E FE 19 7E A6 5B   18 E9 8E D0 A2 9A 26 59  .......[......&Y
#         0010: FE 52 60 44                                        .R`D
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#         0010: 09 B3 44 48                                        ..DH
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 04:26:38.144 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 04:26:38.314 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:38.314 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 04:26:38.316 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 04:26:38.316 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:38.321 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:38.340 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:38.340 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:38.340 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:38.343 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "8B CD 61 D5 44 E1 4B B0 44 CF 06 C6 05 B9 D9 BD 28 92 B8 BC A4 3E AC CB FB 08 F7 98 79 84 DF CE",
#   "session id"          : "66 1C 31 44 59 11 19 94 F8 FF 81 EC 89 C3 55 B8 5B 9E 65 D9 8C 38 88 2D DC 5D FA CD 0E F1 98 80",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D4 58 83 06 EB 5B 7E 85   74 95 01 B6 F0 E3 AC 96  .X...[..t.......
#             0010: 53 2C 8C FC 03 21 E5 9B   CD D8 94 B0 24 42 1D 55  S,...!......$B.U
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.440 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "CA DE 98 AD D5 84 4E EF 1B 9D 08 A4 CE D4 4B 33 B1 57 53 79 A6 47 39 57 DD 46 D8 CA C7 9A 1D C9",
#   "session id"          : "66 1C 31 44 59 11 19 94 F8 FF 81 EC 89 C3 55 B8 5B 9E 65 D9 8C 38 88 2D DC 5D FA CD 0E F1 98 80",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B5 12 C1 BD 69 AD DC 99   2C 40 9B 4E 2E F4 B8 64  ....i...,@.N...d
#           0010: C8 B7 1E 29 13 88 C8 61   1C 89 B0 88 3B EB B3 3E  ...)...a....;..>
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.444 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.444 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.446 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.446 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.446 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.446 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.446 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.449 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.449 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.449 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.450 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:38.450 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:38.450 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.450 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.450 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.465 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.467 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.468 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.471 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.471 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.471 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.471 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.478 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:38.478 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:38.478 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.479 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.480 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.480 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.480 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.481 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.481 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:38.481 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.497 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 8E 50 79",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 04:26:15.000 UTC",
#       "not  after"         : "2024-01-25 04:26:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#           0010: 09 B3 44 48                                        ..DH
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 32 22 3D 5D 1E D1 81   01 99 6D A9 96 5B 04 83  .2"=].....m..[..
#           0010: 7D DC 32 DC                                        ..2.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.497 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.578 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A DB 00 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 04:26:12.000 UTC",
#     "not  after"         : "2024-01-25 04:26:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A2 1E FE 19 7E A6 5B   18 E9 8E D0 A2 9A 26 59  .......[......&Y
#         0010: FE 52 60 44                                        .R`D
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#         0010: 09 B3 44 48                                        ..DH
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.581 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0F E7 20 88 71 FD 36 B1   C9 07 1D F8 34 EE 5F 11  .. .q.6.....4._.
#     0010: 7D EE D7 F1 F1 17 53 35   C4 47 7D A4 6E F5 14 45  ......S5.G..n..E
#     0020: 0D A0 6A 6D CA BC A1 60   EF 17 35 C1 CF 46 2F 5C  ..jm...`..5..F/\
#     0030: 42 4B FA 51 2E 77 F6 93   75 A7 B2 61 BB 9C CB B5  BK.Q.w..u..a....
#     0040: AF E1 BA EF 48 65 8D 25   72 CA 8F 62 31 4D 43 51  ....He.%r..b1MCQ
#     0050: CD 1F 80 1E E9 1F CB 54   79 BF 83 78 3A EA 16 71  .......Ty..x:..q
#     0060: 05 4C 0A 25 C9 DA 7E 45   19 AD 1A 19 E2 8D AD 2F  .L.%...E......./
#     0070: A7 0C CD 88 89 DC 03 D7   D6 83 59 04 FB C7 17 63  ..........Y....c
#     0080: 8E AB 36 5E 55 77 D1 3A   1A 58 31 1F A9 49 6A CB  ..6^Uw.:.X1..Ij.
#     0090: B2 2A 62 97 E2 58 80 39   19 CA 9D 58 77 C3 30 CA  .*b..X.9...Xw.0.
#     00A0: 7B 81 81 30 85 E8 44 57   D9 1F C9 83 DC CC AB 2D  ...0..DW.......-
#     00B0: 77 78 39 56 4C 17 F2 41   92 4A 89 0F BC 41 51 D9  wx9VL..A.J...AQ.
#     00C0: 47 B2 9B 42 C7 A5 55 30   8D 9B ED 13 20 1C 36 AB  G..B..U0.... .6.
#     00D0: 73 ED 52 7D 1A 09 E8 CD   A8 63 ED 74 20 1B F2 BB  s.R......c.t ...
#     00E0: 40 DE 72 A8 21 A8 F2 93   54 44 CC 4E A7 23 A4 50  @.r.!...TD.N.#.P
#     00F0: 6C ED D5 0D B2 B4 89 87   C1 DE F7 BC 66 45 C1 3E  l...........fE.>
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.583 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A2 2A AE 5E 49 AE 28 18   1D 88 B9 C2 58 79 A9 17  .*.^I.(.....Xy..
#     0010: D2 A2 04 85 D8 09 EF EE   8B 65 91 84 78 7B 9E 39  .........e..x..9
#     0020: 5E 74 B0 B9 B5 C2 94 CA   F7 BE 75 CE 33 6D 25 6C  ^t........u.3m%l
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.584 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 04:26:38.585 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:38.585 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 04:26:38.585 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:38.585 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 04:26:38.586 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:38.586 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.586 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.588 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F E8 83 F1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 04:26:19.000 UTC",
#       "not  after"         : "2024-01-25 04:26:19.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#           0010: 09 B3 44 48                                        ..DH
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 C1 29 72 8A A8 9C 96   63 55 67 66 0E 1F CC 6E  (.)r....cUgf...n
#           0010: D3 29 F1 19                                        .)..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A DB 00 75",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 04:26:12.000 UTC",
#       "not  after"         : "2024-01-25 04:26:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 A2 1E FE 19 7E A6 5B   18 E9 8E D0 A2 9A 26 59  .......[......&Y
#           0010: FE 52 60 44                                        .R`D
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#           0010: 09 B3 44 48                                        ..DH
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.612 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 57 35 D0 9C 43 AE DB B8   B2 BD C6 F5 B0 20 65 82  W5..C........ e.
#     0010: 5C EC F4 24 E9 C8 1F 4B   26 8A 19 CE A9 7E F4 BF  \..$...K&.......
#     0020: 96 F4 28 3D 3C A5 71 EB   CF E8 03 E8 91 6D D8 87  ..(=<.q......m..
#     0030: A3 0B 25 BC E1 65 D9 00   31 AC 97 88 BD 0C 8D BB  ..%..e..1.......
#     0040: 58 31 64 E0 79 2B 45 06   12 8F 2F 45 C4 97 7B A2  X1d.y+E.../E....
#     0050: 23 13 27 69 7D EB D0 9C   13 17 1B F9 D2 20 90 EE  #.'i......... ..
#     0060: 82 BA CA 8B 16 CA A3 46   10 02 E6 97 75 7B 83 A2  .......F....u...
#     0070: EC 14 81 41 9A 8D 1C 08   42 CF 64 C8 ED 57 7F CC  ...A....B.d..W..
#     0080: 56 1F 67 45 41 6F 30 1A   19 8E BF 5C 70 C4 77 FE  V.gEAo0....\p.w.
#     0090: 73 62 48 0A A7 BB DB F4   1E EE 7E 90 88 13 83 92  sbH.............
#     00A0: BB 09 4E 86 FC 1A C7 F7   1C 72 64 FD 3B 3A 1B FE  ..N......rd.;:..
#     00B0: 3E 43 6D FF 25 96 50 BD   59 7B A9 87 2C BD 0D E1  >Cm.%.P.Y...,...
#     00C0: A5 5C 28 E1 3F D5 1C 9E   5F 08 30 5D 50 51 5C CC  .\(.?..._.0]PQ\.
#     00D0: 44 FF D2 5C 3B 09 38 3F   86 95 09 2F 8D 2D DB 56  D..\;.8?.../.-.V
#     00E0: 45 7A 63 CF 1F 2C 4A 8D   E2 42 90 CC 05 59 E4 45  Ezc..,J..B...Y.E
#     00F0: 8F 24 A1 57 C5 F0 A0 AE   9A 59 C7 53 E6 FC 8F 1B  .$.W.....Y.S....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.613 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A6 F8 35 32 F3 03 19 FF   E9 CE 52 35 05 88 91 E1  ..52......R5....
#     0010: 91 1B 24 84 CF F2 4B 75   09 4A 8E CA 61 06 13 DF  ..$...Ku.J..a...
#     0020: 90 59 EC 22 E1 2E 49 68   1B 29 E0 1D 32 5D 59 3F  .Y."..Ih.)..2]Y?
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.614 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 04:26:38.667 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 04:26:38.667 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 04:26:38.667 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 04:26:38.667 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:38.698 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DD 39 37 9D 64 5A 67 98 F2 7A AC 71 6D 31 52 AB A5 5F CF 55 CB 6F 56 B2 26 1D B1 A3 34 51 6D C7",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 04:26:38.981 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 04:26:38.982 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-27 04:26:51.937; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 04:26:52.314 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 5B 18 B6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 04:26:10.000 UTC",
#       "not  after"         : "2024-01-25 04:26:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 A2 1E FE 19 7E A6 5B   18 E9 8E D0 A2 9A 26 59  .......[......&Y
#           0010: FE 52 60 44                                        .R`D
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A DB 00 75",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 04:26:12.000 UTC",
#       "not  after"         : "2024-01-25 04:26:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 A2 1E FE 19 7E A6 5B   18 E9 8E D0 A2 9A 26 59  .......[......&Y
#           0010: FE 52 60 44                                        .R`D
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 6C FC 40 7F BB EE 94   B8 7B 6C B5 40 3C 66 82  .l.@......l.@<f.
#           0010: 09 B3 44 48                                        ..DH
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 04:26:52.327 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 04:26:52.642 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:52.643 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 04:26:52.644 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 04:26:52.645 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:52.649 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:52.660 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:52.661 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:52.661 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 04:26:52.663 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "64 2C DB B3 9E 5B 23 A5 33 BA 8C 13 92 6F C4 98 BB 33 93 C8 B2 77 5D 69 C3 F3 BE 0C B0 76 10 7F",
#     "session id"          : "BD 91 12 AE 9A E2 BD 05 A2 56 39 CA 10 37 CC F7 54 42 4B 57 28 A0 28 DD 46 16 7A AE 82 3E 32 EB",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 3E 5A 24 CB 8B E0 BE E7   ED 49 D7 3F 5C 5C 2C 18  >Z$......I.?\\,.
#               0010: B6 4F 0E E0 22 21 FD AB   B9 33 CE CC 73 9C AD 08  .O.."!...3..s...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.693 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "70 F7 69 79 76 E8 5E 7B 3E BF DD BF BB 55 DF 28 98 FE EF 4F EA 03 0D C3 F9 7D EA 90 F8 DA DB 18",
#     "session id"          : "BD 91 12 AE 9A E2 BD 05 A2 56 39 CA 10 37 CC F7 54 42 4B 57 28 A0 28 DD 46 16 7A AE 82 3E 32 EB",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 4A 8D 0C EB CA C0 AD 43   A7 13 3F 22 74 E6 E7 6A  J......C..?"t..j
#             0010: 91 1F 53 39 F7 90 38 DF   B8 31 FA AC AB EC ED 6A  ..S9..8..1.....j
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.693 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.694 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.695 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.695 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.695 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.696 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.697 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.697 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:52.698 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:52.698 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.705 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.706 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.707 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.710 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.711 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.711 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.711 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.711 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.711 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.711 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:52.711 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:52.711 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.712 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.713 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.713 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.713 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.714 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.714 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:26:52.714 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 04:26:52.717 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [
#

[...truncated too long message...]

rity.AccessController.doPrivileged(Native Method)
#   	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 04:28:05.756 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42540/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14635ms
ok 65 stop command for single port in 17619ms
ok 66 status detects locally running solr in 8225ms
ok 67 status does not expose cli parameters to end user in 245ms
ok 68 listing out files in 2843ms
ok 69 copying files around in 6576ms
ok 70 upconfig in 2719ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1258ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1235ms
ok 73 Cleanup in 1262ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 8s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/jha6ti5bvm7yu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 894 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/894/

All tests passed

Build Log:
[...truncated 1225 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:38163/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-27 01:00:41.771; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 01:00:41.775; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-27 01:00:42.574; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 01:00:42.612; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 16962ms
ok 61 start solr with client truststore and security manager in 19612ms
not ok 62 start solr with mTLS needed in 52390ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-tIoNhu/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 38163 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38163 (pid=2333965). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 38164 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38164 (pid=2334090). Happy searching!
#
#     INFO  - 2023-10-27 01:01:45.275; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 01:01:45.280; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 01:01:46.073; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-tIoNhu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tIoNhu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 01:01:46.077; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-tIoNhu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tIoNhu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 01:01:46.077; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-tIoNhu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tIoNhu/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 01:01:46.151 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "65 93 4E 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:01:31.000 UTC",
#     "not  after"         : "2024-01-25 01:01:31.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#         0010: 41 6B BF F5                                        Ak..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 92 43 B0 FF DA B2 13   68 02 19 CB A2 73 76 FA  ..C.....h....sv.
#         0010: DD 5E 4D 96                                        .^M.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 EA E4 D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:01:24.000 UTC",
#     "not  after"         : "2024-01-25 01:01:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 DE 01 13 56 DD 71 8D   AF F3 4B C1 F0 AB 14 9C  &...V.q...K.....
#         0010: 1F B2 8A E6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#         0010: 41 6B BF F5                                        Ak..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 01:01:46.159 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 97 43 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:01:22.000 UTC",
#     "not  after"         : "2024-01-25 01:01:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 DE 01 13 56 DD 71 8D   AF F3 4B C1 F0 AB 14 9C  &...V.q...K.....
#         0010: 1F B2 8A E6                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 EA E4 D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:01:24.000 UTC",
#     "not  after"         : "2024-01-25 01:01:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 DE 01 13 56 DD 71 8D   AF F3 4B C1 F0 AB 14 9C  &...V.q...K.....
#         0010: 1F B2 8A E6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#         0010: 41 6B BF F5                                        Ak..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 01:01:46.239 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 01:01:46.781 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:01:46.782 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 01:01:46.795 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 01:01:46.795 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:01:46.806 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:01:46.829 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:01:46.829 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:01:46.829 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:01:46.835 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C8 2B 4A 09 B8 A0 53 F5 32 0B 3A 15 AF FC C2 5F 19 C9 97 4C E8 DE B4 F1 AD FF 27 B2 4C 3E 0E 71",
#   "session id"          : "33 91 5B 10 87 06 43 46 A0 D3 BA 4C 53 D9 0A AA E6 A1 41 D2 0C 01 A5 B5 4F 64 22 89 C1 9A CF 6A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B4 5A A8 86 7D 09 2C 84   0C 83 C9 20 4D B9 D9 AE  .Z....,.... M...
#             0010: 2D EF 0B F2 02 2B C9 D1   42 58 DB 77 5F DC 57 4C  -....+..BX.w_.WL
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.004 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "20 61 04 29 97 AD F1 12 6B 0A FC AF 20 4C 54 83 CC DF BB 0C 21 A2 E2 66 4D 27 54 58 1A E0 FB 26",
#   "session id"          : "33 91 5B 10 87 06 43 46 A0 D3 BA 4C 53 D9 0A AA E6 A1 41 D2 0C 01 A5 B5 4F 64 22 89 C1 9A CF 6A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 57 73 25 96 5A 05 30 66   9B 72 2A C9 5A 28 DB 50  Ws%.Z.0f.r*.Z(.P
#           0010: 87 73 61 C5 86 0E 79 3A   C9 25 71 03 6E 00 E6 53  .sa...y:.%q.n..S
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.005 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.005 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.006 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.007 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.007 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.007 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.007 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.008 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.008 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.008 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.010 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.016 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.017 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.017 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.017 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:47.019 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:47.019 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.020 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.038 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.039 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.041 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.044 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.045 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.045 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.047 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.048 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.048 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.049 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:47.049 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:47.049 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.051 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.052 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.052 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.054 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.055 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.056 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:47.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.063 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 11 20 A2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:01:27.000 UTC",
#       "not  after"         : "2024-01-25 01:01:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#           0010: 41 6B BF F5                                        Ak..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B8 08 7F AC B3 99 58 E2   AD 6C 29 06 9D 97 A3 31  ......X..l)....1
#           0010: F4 A7 EB D4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.063 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.372 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 EA E4 D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:01:24.000 UTC",
#     "not  after"         : "2024-01-25 01:01:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 DE 01 13 56 DD 71 8D   AF F3 4B C1 F0 AB 14 9C  &...V.q...K.....
#         0010: 1F B2 8A E6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#         0010: 41 6B BF F5                                        Ak..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.383 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B 78 00 BB 4E 3F FF B6   15 C9 19 CF 52 CD A7 44  .x..N?......R..D
#     0010: C7 13 92 7A B1 F0 F1 68   EA EA 14 A7 85 4A DE 75  ...z...h.....J.u
#     0020: 80 36 56 17 9D A1 FA 24   FF 38 EB 3C 68 AD 83 5C  .6V....$.8.<h..\
#     0030: 83 39 99 AE 8C A8 0E A5   97 45 9B 54 21 27 32 48  .9.......E.T!'2H
#     0040: 97 02 E3 30 D6 04 82 1A   CE 2F 8F 18 3B 51 64 F5  ...0...../..;Qd.
#     0050: 65 3E 3F D6 DB 92 64 9B   D0 7E 3D C6 51 65 76 1A  e>?...d...=.Qev.
#     0060: 54 3C 83 08 FD 12 97 F2   F0 1C 8D 04 55 FC C2 B8  T<..........U...
#     0070: 50 3D 75 66 0D 46 B2 52   C1 B9 4E 75 CD 16 F5 19  P=uf.F.R..Nu....
#     0080: 92 26 4E 1C A2 38 32 B9   03 4F D7 3A 63 32 3A AA  .&N..82..O.:c2:.
#     0090: CE 1D 63 6F 6D 4F D0 23   24 DA 33 48 44 B2 2D AE  ..comO.#$.3HD.-.
#     00A0: D9 2E 4A 54 0D 4B 79 16   D3 1F 26 75 27 33 91 7F  ..JT.Ky...&u'3..
#     00B0: 5E 7E 03 3E D9 3D B5 37   F2 14 85 07 59 F6 B1 03  ^..>.=.7....Y...
#     00C0: 1A 65 FB 70 89 AC B2 83   73 3A 01 8C 3D 41 37 64  .e.p....s:..=A7d
#     00D0: EF D1 BE B5 C3 E5 C5 98   B8 44 8F E3 1D FE 43 B5  .........D....C.
#     00E0: CD 4B 89 84 29 5B 7B 8E   00 75 1F 3B AE BE E2 4E  .K..)[...u.;...N
#     00F0: 91 3C B4 06 24 62 F9 B5   9C 0E A2 9B E4 95 9A 46  .<..$b.........F
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.385 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 45 B2 B2 60 ED 84 7F EB   2A 2E 49 00 96 CA E8 22  E..`....*.I...."
#     0010: E6 44 A0 66 58 5A F4 94   DD 4B 96 51 F8 CB DC 7C  .D.fXZ...K.Q....
#     0020: 9A 99 1C 5A 81 D8 DA C6   E5 D9 DA CA D9 3D 04 45  ...Z.........=.E
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.389 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 01:01:47.390 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:47.390 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 01:01:47.390 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:47.390 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 01:01:47.390 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:47.390 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.391 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.395 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 93 4E 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:01:31.000 UTC",
#       "not  after"         : "2024-01-25 01:01:31.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#           0010: 41 6B BF F5                                        Ak..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 92 43 B0 FF DA B2 13   68 02 19 CB A2 73 76 FA  ..C.....h....sv.
#           0010: DD 5E 4D 96                                        .^M.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 EA E4 D4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:01:24.000 UTC",
#       "not  after"         : "2024-01-25 01:01:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 DE 01 13 56 DD 71 8D   AF F3 4B C1 F0 AB 14 9C  &...V.q...K.....
#           0010: 1F B2 8A E6                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#           0010: 41 6B BF F5                                        Ak..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.417 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 86 1D CE C9 49 77 1C 51   D7 D5 8B A3 C1 6B 8B 04  ....Iw.Q.....k..
#     0010: EF 29 2A 4E ED B1 3F B4   EA 4F 89 71 F3 E3 A3 0A  .)*N..?..O.q....
#     0020: BA 22 63 5E 9E 00 53 CD   A1 D7 51 A9 2E A1 64 47  ."c^..S...Q...dG
#     0030: 90 F9 2E DC A0 2C 37 FB   19 FF 69 F3 B0 16 14 4B  .....,7...i....K
#     0040: 4D 7A AF 30 FB 38 78 D1   90 EA 28 E9 61 68 8B 76  Mz.0.8x...(.ah.v
#     0050: FA B8 51 77 F6 B4 11 4E   CD 0E E3 C7 A6 D4 81 40  ..Qw...N.......@
#     0060: 5F A2 E1 BE 3C 90 09 45   59 5D 24 D4 B2 D3 D1 F4  _...<..EY]$.....
#     0070: 4B 35 D8 D0 50 35 D6 D5   14 FB CC B6 A9 89 1C 91  K5..P5..........
#     0080: 94 06 0C C7 9C A1 C0 97   A6 A0 EE BF 0B 11 98 55  ...............U
#     0090: 83 7F C1 38 00 93 3C 5E   12 CD F1 88 F8 71 8E 52  ...8..<^.....q.R
#     00A0: 89 3E 52 D4 38 72 62 4B   B2 15 36 F4 48 40 8E 0A  .>R.8rbK..6.H@..
#     00B0: 9D 80 B7 25 DD 5A A4 FF   45 36 50 C6 C5 F4 4E 12  ...%.Z..E6P...N.
#     00C0: 02 0E 5D D8 97 08 34 A7   8D 71 0E FE 8D DF C5 F6  ..]...4..q......
#     00D0: 3D CA 08 BB 10 2E 8C 31   F0 A8 D6 F7 85 5C E4 44  =......1.....\.D
#     00E0: 26 9D 9F 31 9A A2 15 64   4A 7B EE E8 C0 A3 75 BE  &..1...dJ.....u.
#     00F0: 3A A6 69 28 AB AF 0F D9   DB 21 6E B1 DD 8E 19 7D  :.i(.....!n.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.418 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 20 A8 56 98 B2 25 AF 25   7E E3 87 06 4E 88 5F 11   .V..%.%....N._.
#     0010: C4 FC C8 56 23 C8 9D 26   49 23 18 4A A7 E2 6B 7C  ...V#..&I#.J..k.
#     0020: 91 81 4B 9B CA 6C 01 E0   91 17 50 19 0B 4A 3D A7  ..K..l....P..J=.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.418 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:01:47.608 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:01:47.609 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:01:47.609 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:01:47.609 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:47.653 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "AE 88 C0 53 C6 42 BD AA 76 FC C3 CB 2F 41 D6 ED 30 5B 5B 2B F9 39 71 E0 FD 16 02 E2 12 2C 49 78",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 01:01:48.227 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 01:01:48.230 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 01:01:49.603; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 01:01:49.607; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 01:01:50.003; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-tIoNhu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tIoNhu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 01:01:50.005; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-tIoNhu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tIoNhu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 01:01:50.005; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-tIoNhu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tIoNhu/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 01:01:50.043 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "65 93 4E 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:01:31.000 UTC",
#     "not  after"         : "2024-01-25 01:01:31.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#         0010: 41 6B BF F5                                        Ak..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 92 43 B0 FF DA B2 13   68 02 19 CB A2 73 76 FA  ..C.....h....sv.
#         0010: DD 5E 4D 96                                        .^M.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 EA E4 D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:01:24.000 UTC",
#     "not  after"         : "2024-01-25 01:01:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 DE 01 13 56 DD 71 8D   AF F3 4B C1 F0 AB 14 9C  &...V.q...K.....
#         0010: 1F B2 8A E6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#         0010: 41 6B BF F5                                        Ak..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 01:01:50.047 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 97 43 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:01:22.000 UTC",
#     "not  after"         : "2024-01-25 01:01:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 DE 01 13 56 DD 71 8D   AF F3 4B C1 F0 AB 14 9C  &...V.q...K.....
#         0010: 1F B2 8A E6                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 EA E4 D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:01:24.000 UTC",
#     "not  after"         : "2024-01-25 01:01:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 DE 01 13 56 DD 71 8D   AF F3 4B C1 F0 AB 14 9C  &...V.q...K.....
#         0010: 1F B2 8A E6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#         0010: 41 6B BF F5                                        Ak..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 01:01:50.060 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 01:01:50.216 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:01:50.216 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 01:01:50.218 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 01:01:50.218 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:01:50.236 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:01:50.236 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:01:50.237 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:01:50.237 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:01:50.237 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:01:50.249 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:01:50.249 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:01:50.250 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:01:50.252 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E0 C3 A0 CD 88 1A 37 E1 2C 4C E2 42 20 9F DF BA 7A B0 F7 B6 B7 E1 A5 55 BC DF 27 E4 BC 1C 8A EF",
#   "session id"          : "0A 85 B0 A8 31 E1 73 C5 66 3D 97 4C F8 BB A5 62 DA A7 74 D5 8E 44 58 48 24 A9 EE 05 8B 0B 10 70",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B3 A9 B3 10 37 85 EA A3   E8 93 00 90 FC 14 A3 06  ....7...........
#             0010: 86 72 B3 70 72 E6 5F 4C   21 77 C5 64 1D FD 0C 66  .r.pr._L!w.d...f
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.362 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F1 24 57 38 E1 18 57 C5 B3 5C 94 09 D9 1D EB E4 9A 5B D9 40 E4 DC 5B 56 CB 53 6F 3F EE AC BE 21",
#   "session id"          : "0A 85 B0 A8 31 E1 73 C5 66 3D 97 4C F8 BB A5 62 DA A7 74 D5 8E 44 58 48 24 A9 EE 05 8B 0B 10 70",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: AB B8 5B B5 19 1A C8 FF   28 65 7A 7C 43 E7 8A 54  ..[.....(ez.C..T
#           0010: 3A D3 04 05 21 FA 63 A7   3A 7E 52 60 47 D6 36 4C  :...!.c.:.R`G.6L
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.362 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.363 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.364 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.364 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.364 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.364 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.364 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.368 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.368 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.368 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.368 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.368 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.368 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.369 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.369 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.369 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.369 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:50.369 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:50.369 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.369 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.369 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.388 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.389 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.390 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.394 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.394 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.394 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.394 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.394 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.394 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.395 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:50.395 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:50.395 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.399 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.399 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.399 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.399 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.400 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.401 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:50.401 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.408 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 11 20 A2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:01:27.000 UTC",
#       "not  after"         : "2024-01-25 01:01:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#           0010: 41 6B BF F5                                        Ak..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B8 08 7F AC B3 99 58 E2   AD 6C 29 06 9D 97 A3 31  ......X..l)....1
#           0010: F4 A7 EB D4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.408 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.476 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 EA E4 D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:01:24.000 UTC",
#     "not  after"         : "2024-01-25 01:01:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 DE 01 13 56 DD 71 8D   AF F3 4B C1 F0 AB 14 9C  &...V.q...K.....
#         0010: 1F B2 8A E6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#         0010: 41 6B BF F5                                        Ak..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.479 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 85 B9 B8 0C CC AF 39 5D   41 79 61 5E 37 32 D5 E0  ......9]Aya^72..
#     0010: 01 B7 D6 0D DD 64 21 16   4A 24 FE 32 9C 83 0A A3  .....d!.J$.2....
#     0020: 8F 50 C3 54 E4 33 C3 32   F7 67 24 43 7A 2D 99 C5  .P.T.3.2.g$Cz-..
#     0030: 1C 3C DD 4A 9C ED F3 44   8A 5C 27 44 91 6D 7A C1  .<.J...D.\'D.mz.
#     0040: BF E9 06 68 98 6A 1B 13   6E A5 AC 79 92 82 4D 71  ...h.j..n..y..Mq
#     0050: A0 97 C6 4A 68 5D 39 4A   95 B8 93 9E 43 39 72 81  ...Jh]9J....C9r.
#     0060: C8 90 2C AD 65 30 E3 68   CB 4F FC 37 CC AD E5 FF  ..,.e0.h.O.7....
#     0070: 56 E1 1F 5B D8 36 0A 71   F7 BF BD 7A 27 E8 06 B5  V..[.6.q...z'...
#     0080: D0 CF 99 FA 75 BC A0 6C   26 C4 32 53 7D 5F 5C 45  ....u..l&.2S._\E
#     0090: F3 33 D2 51 AB 8F B6 09   83 D8 5C 4D 39 73 52 72  .3.Q......\M9sRr
#     00A0: 1F 27 3C 37 EA 7F 83 2D   CA CC 10 9B 0A 96 08 A1  .'<7...-........
#     00B0: 0B 10 D1 41 ED A8 C8 34   A8 04 9A 1F D9 E5 98 7A  ...A...4.......z
#     00C0: 8B 4E AD 84 68 89 F3 68   24 9E 1D C3 94 61 DC 19  .N..h..h$....a..
#     00D0: A8 CA B7 53 7D EA E1 B4   6B B8 92 7D 40 55 28 2F  ...S....k...@U(/
#     00E0: FF 02 CF C5 3B 88 CD F2   65 92 9A AB 9F 1C B6 7E  ....;...e.......
#     00F0: 24 B3 DC 65 C1 3F EF 29   1D D8 7C 38 67 E0 80 98  $..e.?.)...8g...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.562 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 29 55 81 DB 83 6D 4E EA   E9 30 0C 75 21 7F C1 C6  )U...mN..0.u!...
#     0010: DE CC A8 36 91 2B DF 5F   A7 FF 62 A5 35 F0 E0 6F  ...6.+._..b.5..o
#     0020: A3 59 6C 11 BA 68 2F 81   14 56 92 18 1F 52 04 B5  .Yl..h/..V...R..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.701 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 01:01:50.703 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:50.703 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 01:01:50.703 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:50.703 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 01:01:50.703 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:01:50.703 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.704 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.706 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 93 4E 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:01:31.000 UTC",
#       "not  after"         : "2024-01-25 01:01:31.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#           0010: 41 6B BF F5                                        Ak..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 92 43 B0 FF DA B2 13   68 02 19 CB A2 73 76 FA  ..C.....h....sv.
#           0010: DD 5E 4D 96                                        .^M.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 EA E4 D4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:01:24.000 UTC",
#       "not  after"         : "2024-01-25 01:01:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 DE 01 13 56 DD 71 8D   AF F3 4B C1 F0 AB 14 9C  &...V.q...K.....
#           0010: 1F B2 8A E6                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#           0010: 41 6B BF F5                                        Ak..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.743 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 74 F2 CB 5E FA E2 00 76   F5 A0 4E 9C 18 DE 4F 57  t..^...v..N...OW
#     0010: 9B C7 95 94 19 B2 31 E6   1C E4 5B 98 72 6F 0E 9F  ......1...[.ro..
#     0020: D7 81 2C 3E CC 5E D6 E4   A8 42 D9 2F B3 C4 32 87  ..,>.^...B./..2.
#     0030: 05 D4 4E 97 A4 A1 E2 E2   30 75 EA CB 65 A8 F0 E1  ..N.....0u..e...
#     0040: 1C F1 01 FA 27 26 EC F9   73 D9 82 20 0E E0 D3 BE  ....'&..s.. ....
#     0050: 30 39 3C 7A B6 BC 2B 75   26 9E EB E1 C0 1E F9 99  09<z..+u&.......
#     0060: CE 42 27 9C 9F 20 34 01   64 33 03 CC 3D 59 91 92  .B'.. 4.d3..=Y..
#     0070: A5 45 D9 05 6D CC 78 ED   8A 2D 8A 9D 86 CB 72 28  .E..m.x..-....r(
#     0080: 4E 04 DA 73 FC A1 7E 2F   D5 85 8D 21 5F 9A 20 74  N..s.../...!_. t
#     0090: 06 DA A8 2D 82 78 EB 5B   DD 98 27 EC 9C 07 91 AD  ...-.x.[..'.....
#     00A0: CE 65 2B 85 AD 55 26 AB   04 DE 9B 4B 1B 0E 0E C6  .e+..U&....K....
#     00B0: A2 C5 E8 00 CF BD 5F D3   F5 13 43 CC C3 73 13 42  ......_...C..s.B
#     00C0: A4 89 A5 89 6E EE 17 23   53 F3 73 A5 21 D1 EC 70  ....n..#S.s.!..p
#     00D0: 3C E1 C1 3D C2 82 2B A5   CA 63 92 DA 83 81 70 87  <..=..+..c....p.
#     00E0: 77 3B BD 89 1E 52 46 46   A6 4B 7C 06 55 B8 6F D3  w;...RFF.K..U.o.
#     00F0: A0 30 49 7F E7 25 F7 61   73 E4 2D 70 7F BA 6B E1  .0I..%.as.-p..k.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.744 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F6 F0 32 E6 6C 03 53 09   44 DC 65 9C F1 66 1D FC  ..2.l.S.D.e..f..
#     0010: 3F 57 FB CA 44 92 60 57   8F 1B E3 CB 4B 56 6E 18  ?W..D.`W....KVn.
#     0020: 82 BE 80 76 8B 0A 98 DB   DB 62 4D 3B 42 6C C5 73  ...v.....bM;Bl.s
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.745 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:01:50.815 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "EA 11 93 61 5D DE D6 B6 F0 6B 5E 4A 1B AF B7 B1 96 71 87 6C E3 49 04 A2 83 4F 0D 60 85 E8 85 74",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 01:01:51.068 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 01:01:51.068 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-27 01:02:04.394; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 01:02:04.779 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 97 43 C9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:01:22.000 UTC",
#       "not  after"         : "2024-01-25 01:01:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 DE 01 13 56 DD 71 8D   AF F3 4B C1 F0 AB 14 9C  &...V.q...K.....
#           0010: 1F B2 8A E6                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 EA E4 D4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:01:24.000 UTC",
#       "not  after"         : "2024-01-25 01:01:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 DE 01 13 56 DD 71 8D   AF F3 4B C1 F0 AB 14 9C  &...V.q...K.....
#           0010: 1F B2 8A E6                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 3C 3A A2 6C 49 C3 35   CB F3 F3 F8 FD AA 9E 80  .<:.lI.5........
#           0010: 41 6B BF F5                                        Ak..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 01:02:04.793 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 01:02:05.002 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:02:05.003 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 01:02:05.004 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 01:02:05.005 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:02:05.009 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:02:05.021 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:02:05.021 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:02:05.021 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 01:02:05.023 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "CF 16 55 65 2E D2 18 B3 8E B3 4E 88 CF 04 3A F2 C2 DB E9 FF 14 41 83 B9 62 6D 73 16 24 5E 84 98",
#     "session id"          : "66 78 61 FF 7F 80 AD 00 4D BF 6C F1 87 80 9C 71 4E E6 3E 76 C5 C2 A8 23 3F E0 A0 76 B0 59 64 1E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: F6 77 74 73 DC 19 74 37   08 D3 0F 0C A0 16 7C 3C  .wts..t7.......<
#               0010: 17 E6 F4 C1 2A 51 F8 91   81 23 12 70 CE 66 DE 58  ....*Q...#.p.f.X
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.048 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "43 79 C5 56 C1 9D E8 6B 7A 7F 6E 0E 09 DC 4F 8D C0 4B FF 33 C4 91 18 C5 DC 4F 77 36 6B F3 B7 8A",
#     "session id"          : "66 78 61 FF 7F 80 AD 00 4D BF 6C F1 87 80 9C 71 4E E6 3E 76 C5 C2 A8 23 3F E0 A0 76 B0 59 64 1E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5B 75 D0 31 76 87 4F B7   A4 A0 F4 66 7D F3 DD 39  [u.1v.O....f...9
#             0010: 6D 66 E1 E0 9A 63 7D 8A   DB ED 9E 37 71 76 6C 3B  mf...c.....7qvl;
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.048 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.048 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.049 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.049 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.049 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.049 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.049 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.049 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.050 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.051 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.052 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.052 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.052 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.052 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.052 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.052 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.052 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:02:05.053 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:02:05.053 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.068 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.069 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.071 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.074 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.074 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.074 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.074 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.075 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:02:05.075 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:02:05.075 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.076 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.077 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.077 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.077 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.078 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.078 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:02:05.078 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 01:02:05.082 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certific

[...truncated too long message...]

ity.AccessController.doPrivileged(Native Method)
#   	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 01:03:18.895 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:38164/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 15030ms
ok 65 stop command for single port in 18294ms
ok 66 status detects locally running solr in 7780ms
ok 67 status does not expose cli parameters to end user in 248ms
ok 68 listing out files in 3121ms
ok 69 copying files around in 6615ms
ok 70 upconfig in 2660ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1232ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1242ms
ok 73 Cleanup in 1257ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 31s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/gpa4ahbgdglfw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 893 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/893/

All tests passed

Build Log:
[...truncated 1228 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:37159/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-26 22:47:16.057; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 22:47:16.062; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-26 22:47:16.883; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 22:47:16.923; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 17500ms
ok 61 start solr with client truststore and security manager in 20080ms
not ok 62 start solr with mTLS needed in 51982ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-46x8Os/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 37159 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37159 (pid=2042986). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 37160 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37160 (pid=2043096). Happy searching!
#
#     INFO  - 2023-10-26 22:48:19.974; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 22:48:19.981; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 22:48:20.820; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1536602f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-46x8Os/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-46x8Os/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 22:48:20.822; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-46x8Os/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-46x8Os/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 22:48:20.825; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(ca,h=[localhost],a=[],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-46x8Os/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-46x8Os/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 22:48:20.893 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 48 D0 DC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 22:48:06.000 UTC",
#     "not  after"         : "2024-01-24 22:48:06.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#         0010: BB 93 A5 C9                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E6 95 A0 41 E3 FC F7 8F   C8 9E 3E 4B 0C CF B9 6A  ...A......>K...j
#         0010: 3F D4 E4 34                                        ?..4
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 3B 7E 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 22:47:59.000 UTC",
#     "not  after"         : "2024-01-24 22:47:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 1F 31 C5 F4 5F 30 96   25 DC 65 51 F5 0F 4A A6  ..1.._0.%.eQ..J.
#         0010: E1 93 C4 4F                                        ...O
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#         0010: BB 93 A5 C9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 22:48:20.897 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 54 43 2B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 22:47:57.000 UTC",
#     "not  after"         : "2024-01-24 22:47:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 1F 31 C5 F4 5F 30 96   25 DC 65 51 F5 0F 4A A6  ..1.._0.%.eQ..J.
#         0010: E1 93 C4 4F                                        ...O
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 3B 7E 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 22:47:59.000 UTC",
#     "not  after"         : "2024-01-24 22:47:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 1F 31 C5 F4 5F 30 96   25 DC 65 51 F5 0F 4A A6  ..1.._0.%.eQ..J.
#         0010: E1 93 C4 4F                                        ...O
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#         0010: BB 93 A5 C9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 22:48:20.919 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 22:48:21.528 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:21.528 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 22:48:21.539 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 22:48:21.539 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:21.545 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:21.560 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:21.560 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:21.560 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:21.562 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7E 63 DD 5A 5D 89 48 4A 24 6B 2A BD A4 05 9A 31 32 AD D9 FB 3A A7 56 93 AD A3 62 3E 46 00 52 55",
#   "session id"          : "DF 8D 98 06 D0 74 83 DA E4 11 2A 77 63 2A 74 AB 20 DD EF 74 31 28 A5 42 6E 19 0F 81 5D 0D A1 CD",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6F 25 05 7D 32 16 3B 6C   E3 F7 29 75 AD D7 A8 57  o%..2.;l..)u...W
#             0010: 79 E5 78 CC 52 B3 16 D4   71 3D 45 FD C1 D2 FB 3F  y.x.R...q=E....?
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.011 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "EA 5A BA 5C B7 34 D3 EB 54 F9 01 B5 B1 83 33 BA 54 64 B8 71 3F E1 15 58 35 59 76 AC 67 24 66 E5",
#   "session id"          : "DF 8D 98 06 D0 74 83 DA E4 11 2A 77 63 2A 74 AB 20 DD EF 74 31 28 A5 42 6E 19 0F 81 5D 0D A1 CD",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5A 5D 0F 75 6A 18 E4 57   7A 04 52 56 4A A8 9A 92  Z].uj..Wz.RVJ...
#           0010: 9D F6 09 52 7E B8 AF 08   7A 70 69 AF C2 96 8E 30  ...R....zpi....0
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.012 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.012 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.018 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.019 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.019 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.019 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.019 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.019 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.020 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.020 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.029 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.035 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.036 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.036 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.038 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.038 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.039 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.039 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:22.042 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:22.048 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.049 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.049 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.072 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.074 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.075 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.101 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.101 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.101 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.101 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.101 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.102 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:22.102 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:22.102 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.103 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.103 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.103 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.103 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.104 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.105 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:22.105 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.134 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E DF A6 45",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 22:48:02.000 UTC",
#       "not  after"         : "2024-01-24 22:48:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#           0010: BB 93 A5 C9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 99 4A B5 C4 64 89 DD   89 F9 93 0D 70 B3 17 12  ..J..d......p...
#           0010: C9 B9 07 6B                                        ...k
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.134 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.242 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 3B 7E 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 22:47:59.000 UTC",
#     "not  after"         : "2024-01-24 22:47:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 1F 31 C5 F4 5F 30 96   25 DC 65 51 F5 0F 4A A6  ..1.._0.%.eQ..J.
#         0010: E1 93 C4 4F                                        ...O
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#         0010: BB 93 A5 C9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.279 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1D 93 CD 7B D3 A1 F2 C5   81 86 A3 AC 2C 4D 26 A8  ............,M&.
#     0010: 45 60 17 DC 8A 2C 6E 3B   64 BF 56 18 51 28 8C 02  E`...,n;d.V.Q(..
#     0020: 40 66 81 F4 E1 2E E1 D6   72 36 88 5F 68 A5 56 22  @f......r6._h.V"
#     0030: 77 84 72 EA CC DD 13 75   B7 BB 26 F1 4D 82 D1 62  w.r....u..&.M..b
#     0040: BD 4B 73 4E 5D D0 BF BA   BF 78 3B D8 9A 7C E4 B7  .KsN]....x;.....
#     0050: 0F E6 53 BE 1F 06 13 6D   05 AB 0B 8B DC C7 B3 D8  ..S....m........
#     0060: 00 98 B4 E9 9C 3B 55 B4   06 00 12 F1 9F 59 3C D3  .....;U......Y<.
#     0070: 48 A6 9D 0C 7F 8F 38 6B   33 A7 2B F1 BF 2F 64 18  H.....8k3.+../d.
#     0080: E7 09 D7 05 2B 35 B2 F6   56 15 C4 B0 28 DE CB 00  ....+5..V...(...
#     0090: E0 E7 0A 0E 3E 54 CC 77   21 99 22 54 30 16 7F 22  ....>T.w!."T0.."
#     00A0: A0 DA D0 AB 15 99 03 69   E4 DC 34 A0 67 2D 17 91  .......i..4.g-..
#     00B0: F7 20 42 01 7F F1 4B 69   56 E3 48 66 82 E3 53 50  . B...KiV.Hf..SP
#     00C0: 34 67 F7 39 5F 35 5C 14   CB 47 ED 1A 51 CF 01 44  4g.9_5\..G..Q..D
#     00D0: 06 B4 04 A4 A2 19 DC 4D   DF B3 76 57 83 1D F0 C6  .......M..vW....
#     00E0: 40 CA 8E 05 AC E8 4F AC   F8 B0 4B 0D 4D 05 F9 20  @.....O...K.M..
#     00F0: 78 CF 86 0C D4 97 A1 A5   38 51 8A D8 C7 3A AE D1  x.......8Q...:..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.281 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8E 09 24 A3 7E 9C 10 09   F1 5B 59 03 E1 5E 62 AE  ..$......[Y..^b.
#     0010: 02 22 9C 75 D3 CC 8F 81   31 94 E5 E4 C1 68 5C C3  .".u....1....h\.
#     0020: BF FE 99 3E 66 20 80 71   20 A5 ED 8E DB 20 F8 5E  ...>f .q .... .^
#   }'}
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 22:48:22.281 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 22:48:22.281 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 22:48:22.282 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 22:48:22.282 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.286 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 22:48:22.287 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:22.288 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 22:48:22.288 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:22.289 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 22:48:22.290 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:22.291 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.291 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.294 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 48 D0 DC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 22:48:06.000 UTC",
#       "not  after"         : "2024-01-24 22:48:06.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#           0010: BB 93 A5 C9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E6 95 A0 41 E3 FC F7 8F   C8 9E 3E 4B 0C CF B9 6A  ...A......>K...j
#           0010: 3F D4 E4 34                                        ?..4
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 3B 7E 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 22:47:59.000 UTC",
#       "not  after"         : "2024-01-24 22:47:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 1F 31 C5 F4 5F 30 96   25 DC 65 51 F5 0F 4A A6  ..1.._0.%.eQ..J.
#           0010: E1 93 C4 4F                                        ...O
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#           0010: BB 93 A5 C9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.361 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 09 75 FB B9 E7 01 FE F2   AF D2 74 A2 B6 7D D1 D6  .u........t.....
#     0010: A9 7D 62 46 32 39 53 FF   1D E7 3B 7A 8C 3F 08 F4  ..bF29S...;z.?..
#     0020: 7E 7E CB 57 32 F8 AD 98   38 02 0E B5 19 F3 49 4D  ...W2...8.....IM
#     0030: E4 A7 1B 86 6C 20 88 DC   73 8A F8 50 EB 4A AC A2  ....l ..s..P.J..
#     0040: BB 3D 66 3A 50 2C A4 B4   18 62 5E 63 A1 3F 17 C0  .=f:P,...b^c.?..
#     0050: 45 62 C1 2F 26 14 51 E9   38 D7 A8 E5 A2 94 03 C5  Eb./&.Q.8.......
#     0060: C0 88 54 99 2C 6F C3 2F   82 84 E1 BB 0E 98 3F 4A  ..T.,o./......?J
#     0070: 9D 33 AB 02 B6 E4 C9 44   07 18 88 7F B9 45 F1 51  .3.....D.....E.Q
#     0080: 9D 18 E0 62 E7 1F DC F9   D7 50 26 FB 41 18 27 A9  ...b.....P&.A.'.
#     0090: 8A 07 FA 87 A6 41 B2 43   9C 93 D0 2A 1B F9 C9 46  .....A.C...*...F
#     00A0: 75 86 26 9B 4C 76 A9 9A   FB EB 09 7E BC BB 7E 73  u.&.Lv.........s
#     00B0: 01 F1 7E 8A BB 7A B4 97   D3 CE A2 2A 73 F9 1B 93  .....z.....*s...
#     00C0: D0 E5 83 E1 BA 7D 4E CE   DC 9D 10 74 32 57 3E F8  ......N....t2W>.
#     00D0: 6E 16 13 C5 9C 3F 35 1E   7A FB 6C AE CB 5A D1 C0  n....?5.z.l..Z..
#     00E0: 5D 90 80 8B FA 80 01 49   00 CB 77 0F 1E E1 0B 90  ]......I..w.....
#     00F0: 34 6D C9 64 DD C5 73 00   7B 54 FD 76 66 EF D4 E5  4m.d..s..T.vf...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.362 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 83 CD F0 99 0D E4 47 E2   91 75 20 09 D2 68 01 A9  ......G..u ..h..
#     0010: 77 67 A0 56 F3 16 3E 77   9A 88 A1 D2 A0 90 6C CA  wg.V..>w......l.
#     0020: 94 21 14 40 39 68 92 BE   F5 D5 7B B1 0D 69 4D 9D  .!.@9h.......iM.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.363 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:22.478 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "00 7A 86 D6 7D C6 3F 7C 2D 13 F7 80 F2 F3 FE F1 80 3B C1 19 4C A8 39 FC B4 EE 8C CB 69 19 DB 66",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 22:48:23.371 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|0E|h2sc-1-thread-2|2023-10-26 22:48:23.378 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 22:48:24.662; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 22:48:24.667; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 22:48:25.071; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-46x8Os/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-46x8Os/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 22:48:25.073; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-46x8Os/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-46x8Os/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 22:48:25.074; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-46x8Os/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-46x8Os/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 22:48:25.122 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 48 D0 DC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 22:48:06.000 UTC",
#     "not  after"         : "2024-01-24 22:48:06.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#         0010: BB 93 A5 C9                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E6 95 A0 41 E3 FC F7 8F   C8 9E 3E 4B 0C CF B9 6A  ...A......>K...j
#         0010: 3F D4 E4 34                                        ?..4
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 3B 7E 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 22:47:59.000 UTC",
#     "not  after"         : "2024-01-24 22:47:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 1F 31 C5 F4 5F 30 96   25 DC 65 51 F5 0F 4A A6  ..1.._0.%.eQ..J.
#         0010: E1 93 C4 4F                                        ...O
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#         0010: BB 93 A5 C9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 22:48:25.125 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 54 43 2B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 22:47:57.000 UTC",
#     "not  after"         : "2024-01-24 22:47:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 1F 31 C5 F4 5F 30 96   25 DC 65 51 F5 0F 4A A6  ..1.._0.%.eQ..J.
#         0010: E1 93 C4 4F                                        ...O
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 3B 7E 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 22:47:59.000 UTC",
#     "not  after"         : "2024-01-24 22:47:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 1F 31 C5 F4 5F 30 96   25 DC 65 51 F5 0F 4A A6  ..1.._0.%.eQ..J.
#         0010: E1 93 C4 4F                                        ...O
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#         0010: BB 93 A5 C9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 22:48:25.138 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 22:48:25.469 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 22:48:25.469 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 22:48:25.469 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 22:48:25.469 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 22:48:25.529 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:25.529 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 22:48:25.531 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 22:48:25.531 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:25.536 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:25.548 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:25.548 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:25.548 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:25.550 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C1 13 B9 3F 24 6B 01 5A 0B 2F EA 4B A6 3F 03 F8 BE 08 47 2F 61 14 C1 39 2C 5C 89 3F 47 B8 05 39",
#   "session id"          : "EA AA 4D A7 32 7B 21 2F 4C 50 C6 39 91 5E BB E2 C3 16 20 0C 95 83 A3 79 67 3C 9F FF 8F B2 E9 AA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2E 7B 71 9A 71 8B E4 54   07 61 CD 33 95 AA 49 27  ..q.q..T.a.3..I'
#             0010: 5C B7 23 7D 81 45 B0 86   73 23 2B 2D 01 A8 75 0D  \.#..E..s#+-..u.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.643 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "76 12 1E 24 09 6F 45 E9 E6 DA 4A 60 1C 13 90 C7 29 CF A1 E7 68 EB 61 B9 C8 FC EE 67 64 32 74 CA",
#   "session id"          : "EA AA 4D A7 32 7B 21 2F 4C 50 C6 39 91 5E BB E2 C3 16 20 0C 95 83 A3 79 67 3C 9F FF 8F B2 E9 AA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A7 9A 35 60 A5 DF 77 EC   12 5C 34 0D D8 38 71 92  ..5`..w..\4..8q.
#           0010: EF 08 A9 10 E2 3D 7F B9   37 CE 78 BE 5A 42 B3 0F  .....=..7.x.ZB..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.643 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.644 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.645 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.645 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.645 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.645 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.645 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.645 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.645 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.645 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.647 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.647 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.647 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:25.648 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:25.648 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.665 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.666 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.669 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.677 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.677 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.677 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.677 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.678 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.678 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.678 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:25.678 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:25.678 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.679 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.679 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.680 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.686 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.687 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.687 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:25.688 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.690 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E DF A6 45",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 22:48:02.000 UTC",
#       "not  after"         : "2024-01-24 22:48:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#           0010: BB 93 A5 C9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 99 4A B5 C4 64 89 DD   89 F9 93 0D 70 B3 17 12  ..J..d......p...
#           0010: C9 B9 07 6B                                        ...k
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.690 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.857 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 3B 7E 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 22:47:59.000 UTC",
#     "not  after"         : "2024-01-24 22:47:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 1F 31 C5 F4 5F 30 96   25 DC 65 51 F5 0F 4A A6  ..1.._0.%.eQ..J.
#         0010: E1 93 C4 4F                                        ...O
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#         0010: BB 93 A5 C9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.861 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 97 B7 EF A6 BC 41 71 69   C6 EA C0 B5 6A 12 77 8F  .....Aqi....j.w.
#     0010: E5 59 22 58 65 87 80 79   55 C6 48 EB A6 BA C4 DE  .Y"Xe..yU.H.....
#     0020: 69 09 66 91 FA D1 39 87   2C 90 F0 4E 6B CA 9B FB  i.f...9.,..Nk...
#     0030: 7A E6 85 5B 6D D3 3D F2   C5 41 DC 7C 85 BE 09 41  z..[m.=..A.....A
#     0040: 43 8E 69 A0 A9 7F 6D E5   ED 10 CC 76 CB C5 BF D8  C.i...m....v....
#     0050: DB 8C 9F 9E 82 BC 8B 87   F0 EE BE 32 12 52 E6 3C  ...........2.R.<
#     0060: 54 2A 16 89 81 77 99 10   07 8D 03 54 B5 03 30 A9  T*...w.....T..0.
#     0070: FF F5 6D 8B 6D BC 29 22   D3 B1 C2 84 25 E4 18 00  ..m.m.)"....%...
#     0080: 47 19 24 49 0C CF A0 B8   BA 0C 73 C8 9D 6B 92 BB  G.$I......s..k..
#     0090: 87 B1 C8 5A 7E 06 C6 3D   7D 1B 48 35 BA CE 9B B9  ...Z...=..H5....
#     00A0: 68 45 62 DB 17 89 F6 A1   93 8E 35 52 5F 45 6A 4E  hEb.......5R_EjN
#     00B0: EB 99 F6 EF EA E3 3D C6   03 74 8B F7 17 28 C2 F6  ......=..t...(..
#     00C0: 3A 4B 0A 05 7A C7 8C 21   CA A2 9D 38 FB C7 BA B5  :K..z..!...8....
#     00D0: 2B 90 75 EB 65 C1 68 95   D7 6C 52 0C 59 66 1F F1  +.u.e.h..lR.Yf..
#     00E0: 28 CC 57 FB 55 28 E6 02   63 1E A3 8F EE 97 71 97  (.W.U(..c.....q.
#     00F0: 6E 91 57 FD 93 1C F4 23   24 1A 26 D1 63 7A 24 C9  n.W....#$.&.cz$.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.862 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DA DF 92 F9 EE E8 EE AF   98 07 76 17 B8 F6 C8 3D  ..........v....=
#     0010: C1 E1 86 BC 20 85 46 79   EB 87 A3 58 92 12 66 12  .... .Fy...X..f.
#     0020: DF 58 15 CD 8A 0E 45 52   33 B9 BE 1F 40 88 5C 7F  .X....ER3...@.\.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.864 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 22:48:25.865 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:25.865 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 22:48:25.865 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:25.865 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 22:48:25.865 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:25.866 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.866 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.868 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 48 D0 DC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 22:48:06.000 UTC",
#       "not  after"         : "2024-01-24 22:48:06.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#           0010: BB 93 A5 C9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E6 95 A0 41 E3 FC F7 8F   C8 9E 3E 4B 0C CF B9 6A  ...A......>K...j
#           0010: 3F D4 E4 34                                        ?..4
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 3B 7E 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 22:47:59.000 UTC",
#       "not  after"         : "2024-01-24 22:47:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 1F 31 C5 F4 5F 30 96   25 DC 65 51 F5 0F 4A A6  ..1.._0.%.eQ..J.
#           0010: E1 93 C4 4F                                        ...O
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#           0010: BB 93 A5 C9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.895 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 11 57 6A 12 4F 5F EB BF   03 AB 46 D5 3B E0 F0 B1  .Wj.O_....F.;...
#     0010: D0 2B 02 4B 51 BA FC 27   00 B2 8D F3 C8 42 5E CB  .+.KQ..'.....B^.
#     0020: FA F1 0A 67 BF E4 39 C4   E9 A7 D6 F1 E2 3F 1D 3F  ...g..9......?.?
#     0030: D8 F4 FF 5A B5 52 1C AA   AC 54 80 F4 4A 83 87 6E  ...Z.R...T..J..n
#     0040: 0A CE 00 1B 79 D5 22 4F   8F 96 C9 85 F9 8A 62 41  ....y."O......bA
#     0050: 15 71 B4 E8 B7 B9 47 FE   E4 0B A5 86 6F DE 76 03  .q....G.....o.v.
#     0060: F8 3A 08 FC 0C 81 2D 92   0E A8 98 E0 EA 6E 3C 12  .:....-......n<.
#     0070: 2B 1F DF 01 35 92 AD 14   ED 27 A5 49 32 41 26 96  +...5....'.I2A&.
#     0080: FB 8B 99 CE 45 65 4B 72   7A 31 CD B2 CA A1 81 C6  ....EeKrz1......
#     0090: 35 8A 52 DE BB 46 CE BA   A7 90 E0 2D 71 9E 2C 4B  5.R..F.....-q.,K
#     00A0: C7 A8 7D E8 9A 7C 03 E9   4D 34 BD B6 7A 2A B2 20  ........M4..z*.
#     00B0: 10 34 2E 18 EB BE 53 EE   62 15 70 A2 EE 3F 94 01  .4....S.b.p..?..
#     00C0: 01 FB 72 AF 3C E5 9D 0F   11 E5 7A EB 95 2E 8D 47  ..r.<.....z....G
#     00D0: 39 79 FA 3B 2A FD 59 6F   FB 98 A5 26 C0 DC F3 44  9y.;*.Yo...&...D
#     00E0: C3 14 10 2D E8 21 B0 FD   DE B5 7E 83 2E 74 C9 3E  ...-.!.......t.>
#     00F0: 54 92 A3 EF 18 9A 12 71   B7 74 21 C8 AB E9 51 32  T......q.t!...Q2
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.896 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D9 9C DD 11 AD CB 22 98   56 DA 1A 3C 96 BD 0C 5E  ......".V..<...^
#     0010: FA 62 EA D4 87 79 28 AB   44 BD DB C8 21 D3 8F E3  .b...y(.D...!...
#     0020: 26 12 C5 EE 27 BC AF BE   4E 8C BD 87 2E C3 A8 4D  &...'...N......M
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:25.897 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-26 22:48:25.953 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "96 46 F6 1F 58 21 DD F8 D2 E3 2E D3 F4 65 3E 4A AD FE F5 F8 B7 65 19 E3 82 A7 5C B1 5D D9 02 44",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 22:48:26.355 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|0E|h2sc-1-thread-2|2023-10-26 22:48:26.356 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-26 22:48:39.537; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 22:48:39.880 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 54 43 2B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 22:47:57.000 UTC",
#       "not  after"         : "2024-01-24 22:47:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 1F 31 C5 F4 5F 30 96   25 DC 65 51 F5 0F 4A A6  ..1.._0.%.eQ..J.
#           0010: E1 93 C4 4F                                        ...O
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 3B 7E 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 22:47:59.000 UTC",
#       "not  after"         : "2024-01-24 22:47:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 1F 31 C5 F4 5F 30 96   25 DC 65 51 F5 0F 4A A6  ..1.._0.%.eQ..J.
#           0010: E1 93 C4 4F                                        ...O
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 39 88 32 DB 58 F4 7F 46   7F E0 3F 90 25 17 D5 D3  9.2.X..F..?.%...
#           0010: BB 93 A5 C9                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 22:48:39.893 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 22:48:40.065 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:40.065 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 22:48:40.067 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 22:48:40.067 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:40.071 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:40.083 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:40.083 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:40.083 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 22:48:40.085 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "84 3D 05 BA CD 9F 09 41 07 41 FA 50 54 5E F2 50 92 A5 DA 80 46 91 74 D1 07 18 61 B7 30 C0 6B 56",
#     "session id"          : "A5 95 E7 34 BB AB 65 82 00 60 7D CB 22 DC 95 41 86 55 46 BC 97 F4 9B 98 ED 5A 78 EE C3 59 86 7E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: D0 9F 88 03 B5 C7 56 95   DD B6 D8 12 9D 3A D2 3A  ......V......:.:
#               0010: B7 8C 50 6E F5 CA 10 BB   1F C2 ED B6 BD ED 45 75  ..Pn..........Eu
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.105 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D8 CA 9E 73 14 DD A3 14 35 69 90 74 F6 E0 05 F6 35 9E 2D CB FD DC ED E2 0A 2E 8D 96 DB 90 0F 61",
#     "session id"          : "A5 95 E7 34 BB AB 65 82 00 60 7D CB 22 DC 95 41 86 55 46 BC 97 F4 9B 98 ED 5A 78 EE C3 59 86 7E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: C6 60 72 76 2C 4D DF 93   9D D5 57 25 EC 60 B7 B1  .`rv,M....W%.`..
#             0010: 87 6D 9A FA 4E 89 E1 77   0A A3 D0 B0 3B AA 3A 60  .m..N..w....;.:`
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.105 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.105 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.106 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.108 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.108 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.108 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:40.109 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:40.109 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.115 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.116 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.117 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.121 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.122 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.122 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.122 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.122 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:40.122 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:40.122 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.123 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.124 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.124 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.124 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.125 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.125 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:48:40.125 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 22:48:40.128 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": 

[...truncated too long message...]

ity.AccessController.doPrivileged(Native Method)
#   	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 22:49:54.202 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:37160/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14806ms
ok 65 stop command for single port in 17931ms
ok 66 status detects locally running solr in 7821ms
ok 67 status does not expose cli parameters to end user in 246ms
ok 68 listing out files in 3081ms
ok 69 copying files around in 6612ms
ok 70 upconfig in 2629ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1249ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1243ms
ok 73 Cleanup in 1258ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 3m 15s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/5o4ht5bj6gziy

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 892 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/892/

All tests passed

Build Log:
[...truncated 1230 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41467/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-26 19:25:43.191; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 19:25:43.196; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-26 19:25:44.030; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 19:25:44.065; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 17118ms
ok 61 start solr with client truststore and security manager in 19874ms
not ok 62 start solr with mTLS needed in 53942ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-N6wxo9/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41467 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41467 (pid=1693793). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41468 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 41468 (pid=1693919). Happy searching!
#
#     INFO  - 2023-10-26 19:26:46.726; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 19:26:46.731; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 19:26:47.493; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-N6wxo9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-N6wxo9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 19:26:47.501; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-N6wxo9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-N6wxo9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 19:26:47.502; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(ca,h=[localhost],a=[],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-N6wxo9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-N6wxo9/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 19:26:47.659 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 13 D5 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 19:26:33.000 UTC",
#     "not  after"         : "2024-01-24 19:26:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#         0010: A6 C7 54 EF                                        ..T.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AB D8 58 53 17 23 86 F4   88 A2 F0 F6 17 82 02 95  ..XS.#..........
#         0010: 44 97 96 2C                                        D..,
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 AC 0B D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 19:26:26.000 UTC",
#     "not  after"         : "2024-01-24 19:26:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 78 FE FD AB 46 A7 D2   B5 14 74 65 F6 CA CD 50  .x...F....te...P
#         0010: A2 99 20 ED                                        .. .
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#         0010: A6 C7 54 EF                                        ..T.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 19:26:47.845 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 D3 38 67",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 19:26:24.000 UTC",
#     "not  after"         : "2024-01-24 19:26:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 78 FE FD AB 46 A7 D2   B5 14 74 65 F6 CA CD 50  .x...F....te...P
#         0010: A2 99 20 ED                                        .. .
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 AC 0B D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 19:26:26.000 UTC",
#     "not  after"         : "2024-01-24 19:26:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 78 FE FD AB 46 A7 D2   B5 14 74 65 F6 CA CD 50  .x...F....te...P
#         0010: A2 99 20 ED                                        .. .
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#         0010: A6 C7 54 EF                                        ..T.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 19:26:47.860 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 19:26:48.204 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:26:48.204 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 19:26:48.208 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 19:26:48.210 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:26:48.226 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:26:48.252 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:26:48.252 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:26:48.252 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:26:48.258 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5C B1 0E 6B 0E 5E 23 8A E9 D2 32 05 6D 86 1E 7E EF DF 9C FB 55 37 51 5F 49 B2 EA 26 86 DA 2B C8",
#   "session id"          : "EE 11 9F 25 A9 09 2D FF 62 8C 05 94 6D FF 0A 59 AF 8C 31 6B 55 70 A7 17 F6 93 EB A1 ED A6 5E 4C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: FF 4A 6C 46 3D 17 72 44   2F 46 00 66 6E 7D CA 5F  .JlF=.rD/F.fn.._
#             0010: 00 B1 B5 E5 DC 81 7B D2   1C B7 7A FE 07 C9 9B 25  ..........z....%
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.384 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "7C 7C 69 77 A7 F3 49 F1 92 D0 1B 26 CA 82 E5 C6 D7 EB B0 DD 29 6C F5 B1 05 9D 04 0A AA B0 EC 97",
#   "session id"          : "EE 11 9F 25 A9 09 2D FF 62 8C 05 94 6D FF 0A 59 AF 8C 31 6B 55 70 A7 17 F6 93 EB A1 ED A6 5E 4C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D1 A6 E1 E0 74 8E 5B 0B   F5 B9 1D CD C8 70 47 F3  ....t.[......pG.
#           0010: 8A 83 13 02 CA 5E 2E A5   24 D7 30 A1 29 94 A8 68  .....^..$.0.)..h
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.386 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.387 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.388 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.388 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.388 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.388 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.388 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.389 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.389 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.389 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.392 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.392 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.392 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.392 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.392 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.392 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.393 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.393 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.393 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.393 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:48.393 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:48.393 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.393 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.393 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.406 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.420 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.429 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.432 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.433 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.433 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.433 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.433 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:48.433 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:48.433 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.434 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.435 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.435 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.435 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.436 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.437 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:48.437 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.445 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "06 3F 93 C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 19:26:28.000 UTC",
#       "not  after"         : "2024-01-24 19:26:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#           0010: A6 C7 54 EF                                        ..T.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E7 43 93 80 AB 8B 53 20   3E C3 FB 24 B6 DA 90 8D  .C....S >..$....
#           0010: E0 2F B0 BF                                        ./..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.445 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.545 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 AC 0B D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 19:26:26.000 UTC",
#     "not  after"         : "2024-01-24 19:26:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 78 FE FD AB 46 A7 D2   B5 14 74 65 F6 CA CD 50  .x...F....te...P
#         0010: A2 99 20 ED                                        .. .
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#         0010: A6 C7 54 EF                                        ..T.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.564 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1D 02 AC 01 02 CB 27 6E   CC 87 93 63 14 DC EF A0  ......'n...c....
#     0010: C1 C5 5D 68 BA CF 17 A1   F0 50 13 B9 63 EF A7 62  ..]h.....P..c..b
#     0020: D6 41 4C 0D F7 AA 37 CC   5F 77 97 70 F3 2D CD 91  .AL...7._w.p.-..
#     0030: 78 16 A1 34 2B 2A 06 3A   AF 84 03 22 D2 26 C3 97  x..4+*.:...".&..
#     0040: 66 A4 16 A3 3F 72 2C DF   32 32 C7 E3 93 67 BF 48  f...?r,.22...g.H
#     0050: EF 0E AE F6 CE 2E C7 33   2E 01 82 29 5B 67 0E EF  .......3...)[g..
#     0060: 51 56 4C 7C B5 20 3D 82   F0 5E 59 39 D7 DF 5E 7C  QVL.. =..^Y9..^.
#     0070: 11 C3 D1 FB C6 E5 68 67   B7 05 F5 03 23 18 9B A8  ......hg....#...
#     0080: 06 64 A4 32 3B E7 B8 9D   5B 53 FF 27 A9 EC A2 1B  .d.2;...[S.'....
#     0090: EB 09 01 65 6E 4F 6A 56   C1 0C C1 60 E0 F7 B0 30  ...enOjV...`...0
#     00A0: D7 2A 1F 30 18 DA A4 EC   CD 9D 75 90 41 F8 DC 22  .*.0......u.A.."
#     00B0: BB 6B F1 03 26 44 03 D6   24 2D A4 B0 DC 01 00 43  .k..&D..$-.....C
#     00C0: D0 95 60 5C A6 70 D1 43   C9 DF BF 2A 17 7F 3B 1D  ..`\.p.C...*..;.
#     00D0: D3 CA 80 6A 5F A2 4C 0F   68 F4 43 9F 46 39 37 A7  ...j_.L.h.C.F97.
#     00E0: 50 22 EE BF 6C B2 7B 8C   01 B4 50 E3 41 7E 4B 53  P"..l.....P.A.KS
#     00F0: E6 FC 7F 3E A2 1A 3E FD   17 91 60 DF CA 29 E3 24  ...>..>...`..).$
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.566 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 58 42 3A 31 08 DD 57 07   16 81 24 C1 DA 44 3B 41  XB:1..W...$..D;A
#     0010: 5F 84 A2 1A 68 EC 42 52   2A 68 5A DD 66 0A 2B BE  _...h.BR*hZ.f.+.
#     0020: 03 D1 F5 15 39 9A 9E 7E   3A E0 79 C1 01 79 75 B0  ....9...:.y..yu.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.568 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 19:26:48.571 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:48.577 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 19:26:48.578 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:48.578 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 19:26:48.578 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:48.578 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.578 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.588 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 13 D5 89",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 19:26:33.000 UTC",
#       "not  after"         : "2024-01-24 19:26:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#           0010: A6 C7 54 EF                                        ..T.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AB D8 58 53 17 23 86 F4   88 A2 F0 F6 17 82 02 95  ..XS.#..........
#           0010: 44 97 96 2C                                        D..,
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "43 AC 0B D4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 19:26:26.000 UTC",
#       "not  after"         : "2024-01-24 19:26:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 78 FE FD AB 46 A7 D2   B5 14 74 65 F6 CA CD 50  .x...F....te...P
#           0010: A2 99 20 ED                                        .. .
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#           0010: A6 C7 54 EF                                        ..T.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.642 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 79 F9 AE 4A 11 3D 33 AF   14 3E 31 9B 2C 78 75 06  y..J.=3..>1.,xu.
#     0010: A7 18 67 B6 6F 08 E4 EF   14 5F BB D7 7C FB 34 30  ..g.o...._....40
#     0020: 24 C6 99 92 0D 36 B7 C0   ED ED 0C 53 62 0C 57 70  $....6.....Sb.Wp
#     0030: 2D 51 D7 23 86 08 33 27   B3 E3 39 53 F7 E2 CC 04  -Q.#..3'..9S....
#     0040: D8 14 10 50 E3 A0 C6 A2   24 FE 40 61 90 22 6B 4F  ...P....$.@a."kO
#     0050: 27 2F CD 0E 09 18 55 77   4F F3 40 6A 3F 42 DC E2  '/....UwO.@j?B..
#     0060: F2 AC AD 13 47 A6 A6 FD   0F 09 74 DC 81 F5 0B E9  ....G.....t.....
#     0070: 6E 36 AF 46 6D C5 50 01   AF 1B 44 9B 3B 1A 2E CD  n6.Fm.P...D.;...
#     0080: 12 8E AD F8 FB DE FD 25   7D B4 B1 38 0C 25 93 07  .......%...8.%..
#     0090: 28 69 2C C8 B3 55 EC 8D   BD B3 5C 7D 00 A9 15 87  (i,..U....\.....
#     00A0: CA 1E 6E 58 55 C4 B9 F4   59 F8 B1 D2 B4 49 6A D1  ..nXU...Y....Ij.
#     00B0: A5 45 46 DA 8B 99 FC 38   EE 27 6B 03 A6 28 A0 33  .EF....8.'k..(.3
#     00C0: 8E 96 AC A0 9B C5 B9 C5   1D 85 51 7D FA 70 91 DF  ..........Q..p..
#     00D0: C8 C3 5F BE 8E 73 52 1B   EC F0 68 16 DE D5 09 19  .._..sR...h.....
#     00E0: 34 99 2F 25 AE 69 D8 EF   81 3F 92 EE E3 C6 40 F1  4./%.i...?....@.
#     00F0: 8C 85 DF 27 81 17 D4 3A   DF EF 8D DC FE 2A CD C2  ...'...:.....*..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.650 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D0 17 2A E3 BB 93 26 40   D2 93 6D F6 07 96 13 87  ..*...&@..m.....
#     0010: 20 B1 71 DC 4D 1E 53 5E   AD 0C 92 31 75 0E 08 3B   .q.M.S^...1u..;
#     0020: FE 4E 9F 20 16 05 1C 4B   5B 7E FA E1 E5 50 88 B8  .N. ...K[....P..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:48.651 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 19:26:49.083 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 19:26:49.083 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 19:26:49.084 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 19:26:49.084 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:49.171 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FE 85 12 0A F0 DA 11 3F 2D 8F A9 3C 51 E6 FC 2A B7 69 68 8A 2D A3 9A DD 57 E0 6F 76 F1 11 CB 92",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 19:26:49.879 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 19:26:49.880 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 19:26:50.917; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 19:26:50.922; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 19:26:51.298; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-N6wxo9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-N6wxo9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 19:26:51.301; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-N6wxo9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-N6wxo9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 19:26:51.301; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-N6wxo9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-N6wxo9/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 19:26:51.338 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 13 D5 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 19:26:33.000 UTC",
#     "not  after"         : "2024-01-24 19:26:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#         0010: A6 C7 54 EF                                        ..T.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AB D8 58 53 17 23 86 F4   88 A2 F0 F6 17 82 02 95  ..XS.#..........
#         0010: 44 97 96 2C                                        D..,
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 AC 0B D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 19:26:26.000 UTC",
#     "not  after"         : "2024-01-24 19:26:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 78 FE FD AB 46 A7 D2   B5 14 74 65 F6 CA CD 50  .x...F....te...P
#         0010: A2 99 20 ED                                        .. .
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#         0010: A6 C7 54 EF                                        ..T.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 19:26:51.341 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 D3 38 67",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 19:26:24.000 UTC",
#     "not  after"         : "2024-01-24 19:26:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 78 FE FD AB 46 A7 D2   B5 14 74 65 F6 CA CD 50  .x...F....te...P
#         0010: A2 99 20 ED                                        .. .
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 AC 0B D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 19:26:26.000 UTC",
#     "not  after"         : "2024-01-24 19:26:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 78 FE FD AB 46 A7 D2   B5 14 74 65 F6 CA CD 50  .x...F....te...P
#         0010: A2 99 20 ED                                        .. .
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#         0010: A6 C7 54 EF                                        ..T.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 19:26:51.354 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 19:26:51.526 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 19:26:51.526 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 19:26:51.527 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 19:26:51.527 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 19:26:51.559 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:26:51.560 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 19:26:51.561 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 19:26:51.562 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:26:51.680 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:26:51.694 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:26:51.694 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:26:51.694 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:26:51.696 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6A DD 23 85 1A EB 0E 0F B2 B1 94 50 A4 A6 D5 A3 28 1B 77 37 BD 85 2F FF B9 22 B1 EA B9 20 27 F7",
#   "session id"          : "68 F9 05 22 33 9D C2 76 4E B6 3B 87 C7 C8 00 2F 38 FD B7 62 A9 2D F4 8C 94 F7 BF C7 3F D6 EA 38",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DD 46 2E DD 6F AC 91 05   7F EF 27 BC 34 C1 61 46  .F..o.....'.4.aF
#             0010: E2 49 54 06 31 B7 0C 07   21 2B 0D 43 AD 08 92 4E  .IT.1...!+.C...N
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.778 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "21 4D 87 61 F0 B9 2A 39 3B A2 F4 8E 29 81 BB 4B 68 43 6B F7 FE 9B CF EC 9A 37 0D 05 DE 5D EF 15",
#   "session id"          : "68 F9 05 22 33 9D C2 76 4E B6 3B 87 C7 C8 00 2F 38 FD B7 62 A9 2D F4 8C 94 F7 BF C7 3F D6 EA 38",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B2 5B 13 9F F2 9B F5 92   6E 65 74 CB DA 48 A9 E5  .[......net..H..
#           0010: DE B6 B4 A6 EB 43 D4 0C   A3 09 EF D4 5C A7 8E 1F  .....C......\...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.778 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.778 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.779 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.779 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.779 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.779 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.779 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.779 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.779 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.779 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.781 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.781 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.781 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.781 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.782 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.782 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.782 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.782 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.782 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.782 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:51.782 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:51.782 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.782 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.782 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.797 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.799 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.802 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.806 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.806 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.806 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.807 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.807 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.808 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.808 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:51.808 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:51.808 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.810 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.810 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.810 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.810 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.812 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.813 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:51.813 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.815 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "06 3F 93 C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 19:26:28.000 UTC",
#       "not  after"         : "2024-01-24 19:26:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#           0010: A6 C7 54 EF                                        ..T.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E7 43 93 80 AB 8B 53 20   3E C3 FB 24 B6 DA 90 8D  .C....S >..$....
#           0010: E0 2F B0 BF                                        ./..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.815 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.878 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 AC 0B D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 19:26:26.000 UTC",
#     "not  after"         : "2024-01-24 19:26:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 78 FE FD AB 46 A7 D2   B5 14 74 65 F6 CA CD 50  .x...F....te...P
#         0010: A2 99 20 ED                                        .. .
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#         0010: A6 C7 54 EF                                        ..T.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.881 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A9 C9 A9 15 AC FE 24 6B   2F 65 F6 DF 72 8F A3 7D  ......$k/e..r...
#     0010: 83 44 EC F9 88 01 EF 42   BB 8F 2F 3A 37 8F 05 B2  .D.....B../:7...
#     0020: 69 3A E6 84 EA 14 5D 65   FB B2 25 0F 14 F7 83 F5  i:....]e..%.....
#     0030: 8F 9B 12 87 38 4B 2D 54   87 12 C4 F5 A0 F2 58 38  ....8K-T......X8
#     0040: 02 C0 A4 9E 19 5F 4C 6B   CF E3 68 3B E9 31 E3 B0  ....._Lk..h;.1..
#     0050: 95 50 7F 28 4E AA C2 C3   FD CC EF 4C D8 42 43 04  .P.(N......L.BC.
#     0060: 51 F1 DF B6 3A F3 A2 BC   EC F9 E6 45 2A 7C F0 9E  Q...:......E*...
#     0070: D8 75 D6 47 38 B4 13 85   19 9D A2 1B 7A 41 6E 51  .u.G8.......zAnQ
#     0080: EA CE FF 52 84 C1 10 ED   8E 77 89 68 A3 2D A6 75  ...R.....w.h.-.u
#     0090: 3B FF BA 11 23 0C DC 54   02 1E 28 DF 08 9F 7B 37  ;...#..T..(....7
#     00A0: D7 22 87 F4 0B 9B 7C FF   77 3A C9 44 DC EC 90 B6  ."......w:.D....
#     00B0: 00 6A 65 53 0F CD 86 27   04 F3 21 10 F7 8E A9 EF  .jeS...'..!.....
#     00C0: 8C 91 3D 1A 2F 17 08 DE   DE 8F D0 16 56 8A AC 50  ..=./.......V..P
#     00D0: C4 38 44 00 11 78 37 56   8E 9F 46 59 09 D5 AA 9A  .8D..x7V..FY....
#     00E0: CB 06 23 C4 93 02 B2 46   A9 8E EB CE CE 89 04 55  ..#....F.......U
#     00F0: C6 05 A7 E5 10 6F 27 39   D7 C2 D5 24 7D 97 46 84  .....o'9...$..F.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.882 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F2 CA C6 E0 49 55 11 FB   55 7D 8B 18 6A 74 87 68  ....IU..U...jt.h
#     0010: F0 8D 69 91 93 4A 1C F9   1A 2F 88 CD 3D 84 D6 AF  ..i..J.../..=...
#     0020: 13 35 45 43 19 B8 E9 8D   AD 78 60 05 6B 3F 93 4D  .5EC.....x`.k?.M
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.884 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 19:26:51.884 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:51.884 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 19:26:51.885 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:51.885 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 19:26:51.885 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:26:51.885 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.885 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.887 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 13 D5 89",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 19:26:33.000 UTC",
#       "not  after"         : "2024-01-24 19:26:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#           0010: A6 C7 54 EF                                        ..T.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AB D8 58 53 17 23 86 F4   88 A2 F0 F6 17 82 02 95  ..XS.#..........
#           0010: 44 97 96 2C                                        D..,
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "43 AC 0B D4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 19:26:26.000 UTC",
#       "not  after"         : "2024-01-24 19:26:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 78 FE FD AB 46 A7 D2   B5 14 74 65 F6 CA CD 50  .x...F....te...P
#           0010: A2 99 20 ED                                        .. .
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#           0010: A6 C7 54 EF                                        ..T.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.909 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 12 3F C7 61 EA DC 3D 19   C0 14 D5 B8 7F 27 63 31  .?.a..=......'c1
#     0010: F1 76 61 25 BB 62 C7 B7   BA E9 97 B1 A6 3B A2 31  .va%.b.......;.1
#     0020: B9 80 F2 CB 9C A5 E1 74   EC 9A E0 C4 E9 56 71 CB  .......t.....Vq.
#     0030: 76 A1 37 F4 2F 01 54 D1   FA 9F 29 F6 05 E7 A0 12  v.7./.T...).....
#     0040: 56 41 07 81 24 7C 17 44   E6 34 66 DD D7 F6 04 D8  VA..$..D.4f.....
#     0050: 88 F0 1C 61 C3 2D 77 10   14 AC 65 AE 22 10 D3 F1  ...a.-w...e."...
#     0060: 88 C8 CA 42 80 6E 2E E2   17 1F 86 DD ED 92 BB 94  ...B.n..........
#     0070: 4F 12 A6 02 70 E9 EF 92   25 F2 54 3C CD 31 8F 85  O...p...%.T<.1..
#     0080: CA 79 C4 A3 CD C1 CA 13   73 DF 04 DF EE D5 40 54  .y......s.....@T
#     0090: AD D4 66 03 9A 74 EC A5   F3 98 87 0E 06 C1 8A D4  ..f..t..........
#     00A0: 82 55 46 2E 8D 2B 5D 0C   35 25 AD E5 61 3E EE 43  .UF..+].5%..a>.C
#     00B0: AE 11 D8 34 86 1C 97 C9   F1 D9 15 FF 85 6D 4C 83  ...4.........mL.
#     00C0: BF D8 74 BD D5 BB BB 20   B8 A4 15 F7 FF AE 8B AE  ..t.... ........
#     00D0: 6C 0D 27 E2 B8 FE C3 D8   42 12 D6 0E DC 4B 58 CA  l.'.....B....KX.
#     00E0: 8E 84 AF CC D4 83 A1 C0   52 63 31 99 21 95 17 05  ........Rc1.!...
#     00F0: 4A 5E 02 C4 C3 D7 46 73   2B 2A B9 32 33 41 6B 18  J^....Fs+*.23Ak.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.910 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 11 C4 21 6C D8 85 BF 7D   C0 C0 8A B0 31 95 D8 37  ..!l........1..7
#     0010: 32 9F 90 D8 DC C4 56 FC   31 71 6C 7F 83 5A 8B 24  2.....V.1ql..Z.$
#     0020: 8F 67 11 D6 F2 0C AF E5   B5 E5 0A 9C 82 5B 82 1C  .g...........[..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.910 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:26:51.974 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DE 17 93 27 48 F2 B2 DF 32 FA 76 AB 40 58 1E 69 98 DC AE 2C C1 DF 42 4B C5 07 6C AD 98 F8 3B 79",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 19:26:52.319 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 19:26:52.320 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-26 19:27:06.037; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 19:27:06.399 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 D3 38 67",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 19:26:24.000 UTC",
#       "not  after"         : "2024-01-24 19:26:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 78 FE FD AB 46 A7 D2   B5 14 74 65 F6 CA CD 50  .x...F....te...P
#           0010: A2 99 20 ED                                        .. .
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "43 AC 0B D4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 19:26:26.000 UTC",
#       "not  after"         : "2024-01-24 19:26:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 78 FE FD AB 46 A7 D2   B5 14 74 65 F6 CA CD 50  .x...F....te...P
#           0010: A2 99 20 ED                                        .. .
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 47 D8 98 E0 0B 75 70 28   8E 5F 09 D0 C5 D7 6D 3A  G....up(._....m:
#           0010: A6 C7 54 EF                                        ..T.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 19:27:06.412 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 19:27:06.578 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:27:06.578 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 19:27:06.579 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 19:27:06.580 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:27:06.584 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:27:06.595 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:27:06.595 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:27:06.595 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 19:27:06.597 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "68 BE 3D 24 FA 1B EB F8 2D 6D 28 69 AE DF C6 8D 3B 0E 61 FC 43 08 FB A1 23 83 A5 77 0F 96 1F 82",
#     "session id"          : "F2 B1 40 22 44 6A A3 BA B2 C3 F6 26 87 98 B8 9D B2 11 83 F2 F9 7F 1B F9 3A 54 DA 27 EA 12 30 D8",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 26 64 86 A2 6B 3B 85 3F   F9 91 94 A5 70 2C 2F 26  &d..k;.?....p,/&
#               0010: 4E FF 36 A1 5C B5 C6 13   03 F9 F2 C3 24 E9 79 34  N.6.\.......$.y4
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.616 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "97 E2 48 E9 B7 63 52 10 AE 1D E2 6B F0 7E 4C C0 69 D3 9B 11 97 A1 4D 98 B0 10 08 AF E8 E9 5C 63",
#     "session id"          : "F2 B1 40 22 44 6A A3 BA B2 C3 F6 26 87 98 B8 9D B2 11 83 F2 F9 7F 1B F9 3A 54 DA 27 EA 12 30 D8",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: E6 D4 46 32 0D 18 99 65   C9 0B 86 E0 90 D0 41 D3  ..F2...e......A.
#             0010: 98 17 F1 A4 68 BA CE 78   D0 0C 35 E1 23 F7 CA 13  ....h..x..5.#...
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.617 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.617 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.618 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.618 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.618 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.618 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.619 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.619 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.619 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.620 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.621 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.621 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.622 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.622 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.622 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.622 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.622 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.622 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.622 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.622 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:27:06.622 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:27:06.623 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.623 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.623 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.629 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.630 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.631 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.634 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.634 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.634 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.634 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.635 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.635 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.635 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:27:06.635 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:27:06.635 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.636 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.636 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.636 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.637 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.637 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.638 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:27:06.638 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 19:27:06.641 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [
# 

[...truncated too long message...]

ity.AccessController.doPrivileged(Native Method)
#   	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 19:28:22.003 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41468/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 15220ms
ok 65 stop command for single port in 17495ms
ok 66 status detects locally running solr in 7763ms
ok 67 status does not expose cli parameters to end user in 264ms
ok 68 listing out files in 3170ms
ok 69 copying files around in 6508ms
ok 70 upconfig in 2589ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1245ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1235ms
ok 73 Cleanup in 1258ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 23s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/nj7k7dlnxbkjk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 891 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/891/

All tests passed

Build Log:
[...truncated 1164 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196852ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3541ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-26 15:44:57.416; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:44:57.475; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1302ms
not ok 8 accept d option with builtin config in 2491ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-26 15:45:01.250; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:45:01.313; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2685ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-26 15:45:03.945; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:45:04.004; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2496ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-26 15:45:06.484; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:45:06.547; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2384ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-26 15:45:08.888; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:45:08.947; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2502ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-26 15:45:11.412; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:45:11.470; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2495ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-26 15:45:13.926; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:45:13.990; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3519ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-26 15:45:22.805; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:45:22.863; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2496ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-26 15:45:25.317; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:45:25.380; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2423ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-26 15:45:27.774; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:45:27.830; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2376ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-26 15:45:30.175; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:45:30.232; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 26029ms
ok 19 Check export command in 22862ms
ok 20 export fails on non cloud mode in 9110ms
not ok 21 using curl to extract a single pdf file in 8815ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 41109 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41109 (pid=1057971). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-26 15:46:37.730; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:46:37.800; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 9036ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 41109 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41109 (pid=1058397). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-26 15:46:46.777; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:46:46.836; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8900ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 41109 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41109 (pid=1058863). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-26 15:46:55.739; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:46:55.796; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30680ms
ok 25 start help flag prints help in 168ms
ok 26 stop help flag prints help in 165ms
ok 27 restart help flag prints help in 171ms
ok 28 status help flag prints help in 50ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 163ms
ok 30 create help flag prints help in 169ms
ok 31 createcore help flag prints help in 164ms
ok 32 createcollection help flag prints help in 164ms
ok 33 delete help flag prints help in 189ms
ok 34 version help flag prints help in 57ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 172ms
ok 36 auth help flag prints help in 167ms
ok 37 assert help flag prints help in 987ms
ok 38 post help flag prints help in 975ms
not ok 39 SQL Module in 10455ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:41109/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-26 15:47:41.110; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:47:41.169; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:41109/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19292ms
not ok 41 icu collation in analysis-extras module in 9230ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-26 15:48:09.714; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:48:09.771; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1357ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10248ms
not ok 44 deploying and undeploying a collection level package in 196607ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 41109 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41109 (pid=1062924). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 11800ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-26 15:51:48.763; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:51:48.820; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-26 15:51:49.855; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:51:49.913; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 11725ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-26 15:52:00.438; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:52:00.491; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-26 15:52:01.560; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:52:01.621; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 4137ms
not ok 48 basic post with a type specified in 1431ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1308ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1327ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1300ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1381ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1345ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1392ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 3782ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-26 15:52:29.885; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:52:29.943; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2472ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-26 15:52:32.395; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:52:32.449; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10730ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:41109/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-gwkI7g%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-26 15:52:43.198; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 15:52:43.256; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:41109/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-gwkI7g%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 13159ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 41109 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41109 (pid=1069310). Happy searching!
#
#     INFO  - 2023-10-26 15:52:50.968; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 15:52:50.973; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 15:52:51.342; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2c1b9e4b(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-gwkI7g/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gwkI7g/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-26 15:52:54.471; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-26 15:52:54.478; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-26 15:52:56.163; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 15:52:56.171; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13291ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 41109 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41109 (pid=1069919). Happy searching!
#
#     INFO  - 2023-10-26 15:53:04.130; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 15:53:04.136; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 15:53:04.512; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-gwkI7g/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gwkI7g/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-26 15:53:04.623; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-gwkI7g/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gwkI7g/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-26 15:53:04.623; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-gwkI7g/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gwkI7g/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-26 15:53:07.936; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-26 15:53:07.940; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-26 15:53:08.371; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-gwkI7g/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gwkI7g/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-26 15:53:08.372; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-gwkI7g/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gwkI7g/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-26 15:53:09.485; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 15:53:09.490; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-26 15:53:09.911; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@355e34c7[provider=null,keyStore=file:///tmp/bats-run-gwkI7g/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gwkI7g/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-26 15:53:09.913; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@355e34c7[provider=null,keyStore=file:///tmp/bats-run-gwkI7g/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gwkI7g/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 11100ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 41109 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41109 (pid=1070460). Happy searching!
#
#     INFO  - 2023-10-26 15:53:17.471; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 15:53:17.477; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-26 15:53:20.669; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 15:53:20.674; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 16012ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-26 15:53:30.829; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-26 15:53:35.299; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-26 15:53:36.717; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 47686ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-gwkI7g/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41109 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41109 (pid=1072675). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41110 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41110 (pid=1072784). Happy searching!
#
#     INFO  - 2023-10-26 15:54:07.790; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 15:54:07.796; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 15:54:08.970; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-gwkI7g/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gwkI7g/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 15:54:08.989; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-gwkI7g/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gwkI7g/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 15:54:08.989; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(ca,h=[localhost],a=[],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-gwkI7g/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gwkI7g/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 15:54:09.073 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 71 82 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 15:53:52.000 UTC",
#     "not  after"         : "2024-01-24 15:53:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 95 99 1F C7 13 38 3E   12 99 11 A1 78 D9 D8 5B  ......8>....x..[
#         0010: 03 87 C0 EE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 40 27 14 FB 72 A7 20 FF   05 5F 61 29 21 0F 1B E1  @'..r. .._a)!...
#         0010: 50 55 78 14                                        PUx.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 58 67 B1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 15:53:42.000 UTC",
#     "not  after"         : "2024-01-24 15:53:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 32 E7 3C 86 D0 6D C9 0D   C4 00 97 C2 BA 33 7B 74  2.<..m.......3.t
#         0010: 30 B4 AC D9                                        0...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 95 99 1F C7 13 38 3E   12 99 11 A1 78 D9 D8 5B  ......8>....x..[
#         0010: 03 87 C0 EE                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 15:54:09.077 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 7E 9D EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 15:53:40.000 UTC",
#     "not  after"         : "2024-01-24 15:53:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 32 E7 3C 86 D0 6D C9 0D   C4 00 97 C2 BA 33 7B 74  2.<..m.......3.t
#         0010: 30 B4 AC D9                                        0...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 58 67 B1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 15:53:42.000 UTC",
#     "not  after"         : "2024-01-24 15:53:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 32 E7 3C 86 D0 6D C9 0D   C4 00 97 C2 BA 33 7B 74  2.<..m.......3.t
#         0010: 30 B4 AC D9                                        0...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 95 99 1F C7 13 38 3E   12 99 11 A1 78 D9 D8 5B  ......8>....x..[
#         0010: 03 87 C0 EE                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 15:54:09.114 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 15:54:10.020 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 15:54:10.020 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 15:54:10.029 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 15:54:10.043 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 15:54:10.054 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 15:54:10.086 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 15:54:10.087 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 15:54:10.102 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 15:54:10.104 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0A 16 56 AC E2 CB 3E 9D 6F 01 AA C9 A3 56 A7 81 62 CE A6 25 B5 85 93 AD 76 55 24 8F FB 60 45 D1",
#   "session id"          : "0C 27 E9 79 94 B9 A1 47 2F 50 5B 1B 68 60 B8 F1 F6 AD 2D 1B 92 B3 1B 87 F3 E5 A2 3E A1 79 84 10",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A7 35 AE 04 4C E7 8D 65   BA 89 AD 96 96 12 20 2B  .5..L..e...... +
#             0010: 01 F6 53 37 4C 32 52 E1   8D 80 45 D1 38 AC 7C 10  ..S7L2R...E.8...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.267 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "80 B8 AB 09 7E 46 BF 32 40 A3 FF FE 55 E7 01 84 63 03 E5 6D 13 2C 45 AC 2D 24 4D 15 40 37 27 D0",
#   "session id"          : "0C 27 E9 79 94 B9 A1 47 2F 50 5B 1B 68 60 B8 F1 F6 AD 2D 1B 92 B3 1B 87 F3 E5 A2 3E A1 79 84 10",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 8E 97 52 7F 9A 7B 90 77   AF 5E 67 43 69 51 5E CA  ..R....w.^gCiQ^.
#           0010: BC C1 08 71 6C 02 0F 51   98 CF EE BA 32 CD 6B 77  ...ql..Q....2.kw
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.268 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.269 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.270 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.270 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.271 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.271 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.271 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.271 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.272 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.272 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.277 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.277 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.277 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.277 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.277 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.277 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.278 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.278 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.278 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.278 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 15:54:10.278 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 15:54:10.278 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.278 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.278 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.294 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.295 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.300 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.315 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.315 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.315 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.315 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.315 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.316 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.316 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 15:54:10.316 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 15:54:10.316 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.317 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.317 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.317 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.318 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.318 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.319 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 15:54:10.319 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.341 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 06 E3 CD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 15:53:46.000 UTC",
#       "not  after"         : "2024-01-24 15:53:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C5 95 99 1F C7 13 38 3E   12 99 11 A1 78 D9 D8 5B  ......8>....x..[
#           0010: 03 87 C0 EE                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 4C 7D 3C A6 24 EE F2   4A D0 81 1A 10 B2 E9 FC  UL.<.$..J.......
#           0010: 8C 30 86 03                                        .0..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.341 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.880 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 58 67 B1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 15:53:42.000 UTC",
#     "not  after"         : "2024-01-24 15:53:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 32 E7 3C 86 D0 6D C9 0D   C4 00 97 C2 BA 33 7B 74  2.<..m.......3.t
#         0010: 30 B4 AC D9                                        0...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 95 99 1F C7 13 38 3E   12 99 11 A1 78 D9 D8 5B  ......8>....x..[
#         0010: 03 87 C0 EE                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.889 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 77 4E 63 F4 2F 12 9D 7B   81 2B 66 5E 8E 9B 9B 4C  wNc./....+f^...L
#     0010: 76 57 F2 7F BC 39 7A B9   77 B5 6B D3 7F A1 21 45  vW...9z.w.k...!E
#     0020: 56 11 A9 5A 42 A2 22 36   6A 2F F5 DA D3 65 F7 D5  V..ZB."6j/...e..
#     0030: A9 FF 01 56 D9 9C C5 4E   7F 92 17 22 FA A5 81 98  ...V...N..."....
#     0040: 07 3B 55 36 8E 4D 8A 3D   AD 38 30 64 AF 9F 60 DB  .;U6.M.=.80d..`.
#     0050: 1C A4 07 59 3A 85 23 DC   C6 9F 70 7C 9C 20 69 FC  ...Y:.#...p.. i.
#     0060: 22 58 93 02 44 39 7B D2   09 71 14 54 09 75 AB 12  "X..D9...q.T.u..
#     0070: 54 44 12 18 05 FA 6F E9   22 B4 2E 4A 5A 5A 3D BB  TD....o."..JZZ=.
#     0080: 39 52 BB 5F 24 B4 6E 14   27 0B 09 6A 97 1D 5E F4  9R._$.n.'..j..^.
#     0090: C4 16 00 EA 3F 11 27 2D   B0 CB E5 A0 1F 9C E1 11  ....?.'-........
#     00A0: BB D2 D9 E3 5A AB E1 F8   B7 96 30 8D C2 0D 8F 4C  ....Z.....0....L
#     00B0: 26 50 4B 6B 18 98 C1 34   55 6F 76 42 84 FB A1 3C  &PKk...4UovB...<
#     00C0: 7E 56 1C A8 1C E6 FE 2D   02 57 9F 70 4C 44 26 11  .V.....-.W.pLD&.
#     00D0: DB 7D 47 8C 91 83 B3 F4   F4 7F 5D 5F 07 B5 93 0F  ..G.......]_....
#     00E0: 9D 79 B1 D4 17 55 0C 7F   C9 32 A4 AC 01 99 FA 81  .y...U...2......
#     00F0: 74 9F 8F CD 47 E6 B4 C3   F3 21 5C 0F FD 4C 44 9A  t...G....!\..LD.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.897 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D1 F8 8B 58 68 1B E0 B2   D9 17 0A C9 03 EA 5A 4E  ...Xh.........ZN
#     0010: A0 A3 34 97 05 90 BB E2   F4 2E CD D5 06 0D 8D 69  ..4............i
#     0020: 0D 7C AD 5D 9B 22 8B 9D   53 AC FD CD 5D E9 D4 E3  ...]."..S...]...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 15:54:10.899 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 15:54:10.900 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thr

[...truncated too long message...]

 for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 CA 73 06",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 15:54:39.000 UTC",
#     "not  after"         : "2024-01-24 15:54:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 17 41 92 85 F8 AE A9   17 54 38 55 FB 38 5F 25  ..A......T8U.8_%
#         0010: EF DC 44 A1                                        ..D.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E D6 97 8D D9 BE AA 6E   63 E4 40 25 20 5E D9 7D  >......nc.@% ^..
#         0010: D3 A1 77 F4                                        ..w.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 15:55:04.017 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 7E 87 3E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 15:54:30.000 UTC",
#     "not  after"         : "2024-01-24 15:54:30.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 18 BB B3 7C FA 6D C2   46 1E 61 CD 18 37 83 C5  M.....m.F.a..7..
#         0010: 19 4C 90 F6                                        .L..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 17 41 92 85 F8 AE A9   17 54 38 55 FB 38 5F 25  ..A......T8U.8_%
#         0010: EF DC 44 A1                                        ..D.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 5F 04 F9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 15:54:28.000 UTC",
#     "not  after"         : "2024-01-24 15:54:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 18 BB B3 7C FA 6D C2   46 1E 61 CD 18 37 83 C5  M.....m.F.a..7..
#         0010: 19 4C 90 F6                                        .L..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 15:55:04.030 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14614ms
ok 65 stop command for single port in 18286ms
not ok 66 status detects locally running solr in 1534ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 246ms
ok 68 listing out files in 3005ms
ok 69 copying files around in 6596ms
ok 70 upconfig in 2565ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1240ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1237ms
not ok 73 Cleanup in 2485ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 6m 31s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/m5waqcrgl23i4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 890 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/890/

All tests passed

Build Log:
[...truncated 1168 lines...]
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-26 13:05:43.979; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 13:05:44.031; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 3481ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-26 13:05:46.366; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 13:05:47.532; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2306ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-26 13:05:49.793; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 13:05:49.849; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 4545ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-26 13:05:52.117; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 13:05:54.395; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 23526ms
ok 19 Check export command in 22365ms
ok 20 export fails on non cloud mode in 8658ms
not ok 21 using curl to extract a single pdf file in 10647ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 46519 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46519 (pid=16114). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-26 13:06:57.651; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 13:06:59.908; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 9736ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 46519 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46519 (pid=16587). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-26 13:07:08.486; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 13:07:09.651; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 11694ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 46519 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46519 (pid=17056). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-26 13:07:18.060; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 13:07:21.422; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30355ms
ok 25 start help flag prints help in 164ms
ok 26 stop help flag prints help in 159ms
ok 27 restart help flag prints help in 165ms
ok 28 status help flag prints help in 51ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 167ms
ok 30 create help flag prints help in 163ms
ok 31 createcore help flag prints help in 164ms
ok 32 createcollection help flag prints help in 169ms
ok 33 delete help flag prints help in 167ms
ok 34 version help flag prints help in 55ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 173ms
ok 36 auth help flag prints help in 168ms
ok 37 assert help flag prints help in 943ms
ok 38 post help flag prints help in 955ms
not ok 39 SQL Module in 11775ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:46519/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-26 13:08:06.005; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 13:08:07.159; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:46519/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 22746ms
not ok 41 icu collation in analysis-extras module in 8525ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-26 13:08:38.943; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 13:08:39.000; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1389ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 20111 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 20111 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10034ms
ok 44 deploying and undeploying a collection level package in 13786ms
ok 45 Affinity placement plugin using sysprop in 19341ms
ok 46 Random placement plugin using ENV in 21098ms
ok 47 Check help command in 3642ms
ok 48 basic post with a type specified in 5460ms
ok 49 basic post WITHOUT a type specified in 12449ms
ok 50 crawling a directory in 4610ms
ok 51 crawling a web site in 4947ms
ok 52 commit and optimize and delete in 4038ms
ok 53 args mode in 6551ms
ok 54 stdin mode in 3417ms
ok 55 post solr log into solr via script in 11127ms
ok 56 post solr log into solr via cli in 9452ms
ok 57 allowPaths - backup in 16382ms
ok 58 start solr with ssl in 18385ms
ok 59 use different hostname when not checking peer-name in 30829ms
ok 60 start solr with ssl and auth in 16825ms
ok 61 start solr with client truststore and security manager in 19412ms
ok 62 start solr with mTLS needed in 63626ms
not ok 63 start solr with mTLS wanted in 36606ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 475)
#   `assert_output --partial "Created collection 'test'"' failed
# /tmp/bats-run-vZrDuR/test/63/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 46519 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46519 (pid=1395). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 46520 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46520 (pid=1513). Happy searching!
#
#     INFO  - 2023-10-26 13:14:12.006; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 13:14:12.334; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 13:14:12.673; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-vZrDuR/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vZrDuR/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:14:12.675; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-vZrDuR/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vZrDuR/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:14:12.676; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-vZrDuR/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vZrDuR/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:14:12.715 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 D9 D1 F6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:13:58.000 UTC",
#     "not  after"         : "2024-01-24 13:13:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 38 C1 58 EC B5 7E 0B   81 CC 60 A8 B7 D4 8E F4  .8.X......`.....
#         0010: 63 89 2D 1C                                        c.-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 14 15 ED 2B 0D D6 71   88 00 4C 61 94 8D 8E 45  ....+..q..La...E
#         0010: 60 FC 0E 6A                                        `..j
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:14:12.719 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 8C F0 0B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:13:52.000 UTC",
#     "not  after"         : "2024-01-24 13:13:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A 9E D1 31 0F 09 5C 87   9C C1 6E C3 D4 F4 4D E8  j..1..\...n...M.
#         0010: 5C 9A F5 87                                        \...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 38 C1 58 EC B5 7E 0B   81 CC 60 A8 B7 D4 8E F4  .8.X......`.....
#         0010: 63 89 2D 1C                                        c.-.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 83 4E 4A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:13:50.000 UTC",
#     "not  after"         : "2024-01-24 13:13:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A 9E D1 31 0F 09 5C 87   9C C1 6E C3 D4 F4 4D E8  j..1..\...n...M.
#         0010: 5C 9A F5 87                                        \...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:14:12.731 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:14:12.894 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:14:12.894 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:14:12.896 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:14:12.896 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:14:12.900 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:14:12.910 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:14:12.911 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:14:12.911 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:14:12.913 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D8 AC 0C F5 4A 9A EC 9C ED A3 09 34 D8 9E 6D 46 7B 6F 1C EC C8 37 2D 69 23 AD F7 60 AE 4D CD 90",
#   "session id"          : "96 8B C8 4B E7 E4 A4 57 D6 40 C0 E6 78 B7 0E C9 A8 E4 11 C6 71 0A 3E B7 B0 99 10 06 22 11 B1 64",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 89 A3 9F 5D AF 1F 07 2C   73 43 79 3C 6C C3 ED CC  ...]...,sCy<l...
#             0010: BF A2 AA 70 38 EA 37 99   15 13 C2 81 6D 35 76 62  ...p8.7.....m5vb
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.002 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B5 44 2A 88 CB 9F 54 D3 B8 F7 F4 67 62 0F 72 FB AE 7D 1D AA F1 F0 CF 41 14 65 3C 4C 07 C1 FF 75",
#   "session id"          : "96 8B C8 4B E7 E4 A4 57 D6 40 C0 E6 78 B7 0E C9 A8 E4 11 C6 71 0A 3E B7 B0 99 10 06 22 11 B1 64",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1C 85 C5 5E 02 00 18 7F   CA 1F 46 59 5B DF 6B A5  ...^......FY[.k.
#           0010: 2F 69 44 62 6F EF 75 86   66 D0 8D 3B EC 22 D3 17  /iDbo.u.f..;."..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.003 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.003 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.004 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.004 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.004 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.004 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.004 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.004 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.004 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.004 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.006 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.006 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.006 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.006 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.006 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.006 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.006 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.007 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.007 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.007 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:13.007 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:13.007 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.007 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.007 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.025 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.027 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.029 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.032 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.032 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.032 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.032 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.032 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.033 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.033 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:13.033 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:13.033 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.034 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.034 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.034 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.035 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.035 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.036 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:13.036 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.040 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5D 0B 20 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:13:54.000 UTC",
#       "not  after"         : "2024-01-24 13:13:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 38 C1 58 EC B5 7E 0B   81 CC 60 A8 B7 D4 8E F4  .8.X......`.....
#           0010: 63 89 2D 1C                                        c.-.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 35 9A 7B FF C6 E1 C1   03 2F BC 38 36 CD 40 0C  .5......./.86.@.
#           0010: C4 99 A7 77                                        ...w
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.040 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:14:13.089 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:14:13.089 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:14:13.089 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:14:13.090 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.105 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 8C F0 0B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:13:52.000 UTC",
#     "not  after"         : "2024-01-24 13:13:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A 9E D1 31 0F 09 5C 87   9C C1 6E C3 D4 F4 4D E8  j..1..\...n...M.
#         0010: 5C 9A F5 87                                        \...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 38 C1 58 EC B5 7E 0B   81 CC 60 A8 B7 D4 8E F4  .8.X......`.....
#         0010: 63 89 2D 1C                                        c.-.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.108 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 76 E0 E2 5B 74 1C D4 19   AC D1 EC 5F 4D 48 11 D7  v..[t......_MH..
#     0010: 99 6F FA 94 0A E5 54 7A   A4 FC 30 D2 A1 BE 2B B3  .o....Tz..0...+.
#     0020: D6 45 4F 88 01 04 DB DD   4F 48 F8 C4 80 A7 F7 51  .EO.....OH.....Q
#     0030: E3 01 3F AE BD BC F3 0F   7D 9C 46 8C 6A B5 64 B1  ..?.......F.j.d.
#     0040: F0 DA 8E EB C9 36 7E 17   04 4D AC 69 F6 E6 9C 54  .....6...M.i...T
#     0050: 86 4C 99 FD CC A8 58 4E   71 53 87 61 80 E2 B1 A5  .L....XNqS.a....
#     0060: 5E 8C 78 31 E6 DD 93 A5   34 7B 2D 6E CD 68 54 40  ^.x1....4.-n.hT@
#     0070: E9 A5 B4 2B E9 92 9A 3A   C6 00 5A B3 96 59 C8 E0  ...+...:..Z..Y..
#     0080: 65 F5 22 1D AC C0 2A 70   6D 29 9F D8 F6 0D D3 1E  e."...*pm)......
#     0090: BD 85 94 0A 8C 45 10 77   EC F0 F5 C9 CB CC 51 81  .....E.w......Q.
#     00A0: 22 51 83 72 3C 93 C0 B3   D1 75 51 22 B9 E4 7D E1  "Q.r<....uQ"....
#     00B0: 82 C0 A6 2F 0F 80 86 5E   B1 61 35 87 45 79 6C A4  .../...^.a5.Eyl.
#     00C0: FF 4D 60 9B 12 E2 B1 33   AD D7 91 B2 2E 21 8E 6C  .M`....3.....!.l
#     00D0: 86 3C 75 27 FF 43 58 C3   AB 8F 3F B5 D1 5C 1D BC  .<u'.CX...?..\..
#     00E0: 73 04 AE 48 CE 69 39 12   D7 0C FE C9 B3 66 3B CC  s..H.i9......f;.
#     00F0: 2A 98 93 B3 1E 37 08 AE   FB 95 44 CB 5A 73 A1 65  *....7....D.Zs.e
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.110 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D3 11 B1 7F CF 45 4A 2A   78 63 6C CF 75 43 0D 5E  .....EJ*xcl.uC.^
#     0010: 0A BE 2A 98 AA 72 59 79   38 6F 1D 5E 28 C6 B4 F0  ..*..rYy8o.^(...
#     0020: 71 6D 6A AF F5 2A CF AB   98 87 82 28 CD 70 CD 64  qmj..*.....(.p.d
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.112 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:14:13.112 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:13.112 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:14:13.113 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:13.113 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:14:13.113 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:13.113 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.113 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.114 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 D9 D1 F6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:13:58.000 UTC",
#       "not  after"         : "2024-01-24 13:13:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 38 C1 58 EC B5 7E 0B   81 CC 60 A8 B7 D4 8E F4  .8.X......`.....
#           0010: 63 89 2D 1C                                        c.-.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 14 15 ED 2B 0D D6 71   88 00 4C 61 94 8D 8E 45  ....+..q..La...E
#           0010: 60 FC 0E 6A                                        `..j
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.137 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7C 23 0F 79 14 44 AB 1A   4C 61 85 6C 18 79 14 09  .#.y.D..La.l.y..
#     0010: 04 20 75 12 E4 B9 32 46   00 54 57 11 7F A7 A0 F3  . u...2F.TW.....
#     0020: D5 37 5E 56 95 AA AA 5B   A7 C6 16 AC 56 E8 3B 96  .7^V...[....V.;.
#     0030: BA C1 D4 CE 8B 7F 38 CF   8E 70 49 55 60 A8 33 F8  ......8..pIU`.3.
#     0040: 9D A8 CA C7 35 2F A3 33   85 5E 61 A6 53 96 67 17  ....5/.3.^a.S.g.
#     0050: 84 BE 4A 16 42 D9 0E 21   E3 F3 5B 48 0F B5 D3 8A  ..J.B..!..[H....
#     0060: B0 7A 97 1F 18 68 53 37   CA 48 7E C9 95 A4 79 74  .z...hS7.H....yt
#     0070: 47 A1 E1 C3 C6 BA 51 03   B4 A0 23 99 F0 BF 19 FC  G.....Q...#.....
#     0080: DD 0F A9 EB 06 3B 66 FE   7D CB B8 8A 4B 55 27 98  .....;f.....KU'.
#     0090: 4A B0 EA 89 55 CB FB 18   89 D1 FE 62 FF F5 D6 AA  J...U......b....
#     00A0: 5F C6 AA CC 0C CC 61 83   CD 86 89 FB 42 E0 E9 6F  _.....a.....B..o
#     00B0: 14 86 B7 1D 5A E8 63 5F   95 B9 34 F8 FC 9B A5 30  ....Z.c_..4....0
#     00C0: F7 37 6A 37 84 71 E1 E8   C3 95 A5 D6 5A 9E D0 03  .7j7.q......Z...
#     00D0: 9A 80 68 15 07 90 07 C2   F5 B2 8D 98 16 95 F8 BE  ..h.............
#     00E0: 58 6B 83 38 7A 78 4E E6   8A 08 B0 16 D8 C7 68 31  Xk.8zxN.......h1
#     00F0: 96 9A 13 43 EF 63 14 CD   FC C8 7E 7B 76 66 E5 D2  ...C.c......vf..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.138 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 05 06 8F B6 E4 9D 03 3E   D2 05 6B E9 A7 9F E3 82  .......>..k.....
#     0010: 28 A1 92 91 E2 52 9C 7D   0A 10 9C 7D E4 04 53 5C  (....R........S\
#     0020: 71 8E B0 50 16 E7 99 AC   A9 60 11 2D 37 A3 D3 28  q..P.....`.-7..(
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:13.138 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-26 13:14:13.222 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CC 97 05 4B E5 7C 13 28 B4 4A B0 8C 57 D7 A8 CB C2 70 A7 76 B0 F4 80 5E 17 7E 6C C4 B8 35 65 8D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-26 13:14:13.419 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 13:14:13.420 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 13:14:13.420 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 13:14:15.217; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 13:14:15.223; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 13:14:16.276; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-vZrDuR/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vZrDuR/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:14:16.279; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-vZrDuR/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vZrDuR/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:14:16.279; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-vZrDuR/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vZrDuR/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:14:16.319 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 D9 D1 F6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:13:58.000 UTC",
#     "not  after"         : "2024-01-24 13:13:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 38 C1 58 EC B5 7E 0B   81 CC 60 A8 B7 D4 8E F4  .8.X......`.....
#         0010: 63 89 2D 1C                                        c.-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 14 15 ED 2B 0D D6 71   88 00 4C 61 94 8D 8E 45  ....+..q..La...E
#         0010: 60 FC 0E 6A                                        `..j
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:14:16.323 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 8C F0 0B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:13:52.000 UTC",
#     "not  after"         : "2024-01-24 13:13:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A 9E D1 31 0F 09 5C 87   9C C1 6E C3 D4 F4 4D E8  j..1..\...n...M.
#         0010: 5C 9A F5 87                                        \...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 38 C1 58 EC B5 7E 0B   81 CC 60 A8 B7 D4 8E F4  .8.X......`.....
#         0010: 63 89 2D 1C                                        c.-.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 83 4E 4A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:13:50.000 UTC",
#     "not  after"         : "2024-01-24 13:13:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A 9E D1 31 0F 09 5C 87   9C C1 6E C3 D4 F4 4D E8  j..1..\...n...M.
#         0010: 5C 9A F5 87                                        \...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:14:16.345 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:14:16.592 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:14:16.592 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:14:16.594 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:14:16.594 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:14:16.598 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:14:16.609 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:14:16.609 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:14:16.609 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:14:16.611 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "73 ED 75 F7 06 A3 04 B6 2F 71 8E A9 F5 2E C8 BD D8 C4 68 06 2F C5 CA 2F 3B 59 16 0F 58 F7 42 DC",
#   "session id"          : "3E 54 66 FE A4 22 BA 1F 0B 25 98 48 8A 8E 2D 59 64 E5 74 77 7D A1 5C DE 09 2C 53 96 9F F9 4A A6",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E7 B4 BE 79 40 09 8C E4   24 13 8B E6 23 9C DE A2  ...y@...$...#...
#             0010: E7 66 CA 74 D7 43 60 E5   AB 91 C7 23 34 BA 34 33  .f.t.C`....#4.43
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.720 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C1 F6 B7 64 B1 51 6B FF E0 B0 B8 D9 4F 8A EA B5 12 48 18 B5 C1 C1 4A 62 0E BD 97 E0 A4 90 74 8E",
#   "session id"          : "3E 54 66 FE A4 22 BA 1F 0B 25 98 48 8A 8E 2D 59 64 E5 74 77 7D A1 5C DE 09 2C 53 96 9F F9 4A A6",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 70 E6 E1 99 D5 5E 12 D4   F5 BF 68 45 7E 95 C3 B7  p....^....hE....
#           0010: 68 65 B1 EB CC E4 B1 66   EF 46 E3 DB 58 A0 6E 5D  he.....f.F..X.n]
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.721 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.721 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.722 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.727 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.727 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.728 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:16.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:16.729 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.729 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.729 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.749 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.751 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.752 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.755 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.755 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.755 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.756 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.756 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.756 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:16.759 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:16.759 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.761 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.761 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.761 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.761 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.762 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.763 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:16.763 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.773 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5D 0B 20 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:13:54.000 UTC",
#       "not  after"         : "2024-01-24 13:13:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 38 C1 58 EC B5 7E 0B   81 CC 60 A8 B7 D4 8E F4  .8.X......`.....
#           0010: 63 89 2D 1C                                        c.-.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 35 9A 7B FF C6 E1 C1   03 2F BC 38 36 CD 40 0C  .5......./.86.@.
#           0010: C4 99 A7 77                                        ...w
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.773 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.966 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 8C F0 0B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:13:52.000 UTC",
#     "not  after"         : "2024-01-24 13:13:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A 9E D1 31 0F 09 5C 87   9C C1 6E C3 D4 F4 4D E8  j..1..\...n...M.
#         0010: 5C 9A F5 87                                        \...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 38 C1 58 EC B5 7E 0B   81 CC 60 A8 B7 D4 8E F4  .8.X......`.....
#         0010: 63 89 2D 1C                                        c.-.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.969 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 83 DE AE 3E DC 0A E0 59   11 CF 2E 25 1A F4 0E F9  ...>...Y...%....
#     0010: 1E 9C 08 66 7A 3C 6A 57   78 4D 19 60 DA 86 56 77  ...fz<jWxM.`..Vw
#     0020: D2 0A A6 BC 92 8E 16 36   49 A9 A8 07 59 B7 23 64  .......6I...Y.#d
#     0030: 43 6C 0A 65 04 1B 2B 50   AE 8A A1 FB EE 8B 96 B2  Cl.e..+P........
#     0040: F6 A4 08 BB 1F 73 A4 99   7F A6 BC 2E 80 A3 4C 37  .....s........L7
#     0050: C8 F2 27 30 2C 98 52 C1   98 A2 00 F9 1E DC AB B3  ..'0,.R.........
#     0060: C1 DB 01 71 62 85 41 A3   49 77 F1 ED 95 53 B2 0E  ...qb.A.Iw...S..
#     0070: 8F 90 37 0B 52 46 51 1B   60 64 32 C0 2C AB B5 7D  ..7.RFQ.`d2.,...
#     0080: 1D DD D8 B5 E9 D3 47 99   BD 8F 7C 9A F1 6E 8B CF  ......G......n..
#     0090: 1C F2 2F 3C 53 E3 5F 98   B1 DC D7 31 9F 69 C0 98  ../<S._....1.i..
#     00A0: 49 40 F2 C0 71 76 32 81   97 95 43 BB 28 0C 4A 18  I@..qv2...C.(.J.
#     00B0: B9 6D CC D7 69 39 8E 42   FA E8 B9 29 18 3B EC D1  .m..i9.B...).;..
#     00C0: BD 11 14 C1 C3 3E BF 5F   37 2F E9 B0 E5 BA FB D3  .....>._7/......
#     00D0: 6E DC EB DE 25 70 B6 A6   C7 52 55 7D A0 7F 16 E1  n...%p...RU.....
#     00E0: 40 0A 7A 5D 80 58 7C BE   66 3E 0C DD 51 4F F7 52  @.z].X..f>..QO.R
#     00F0: 00 5A 93 4F CF 85 A8 91   98 B6 32 4C E0 B7 74 78  .Z.O......2L..tx
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.971 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A4 ED FC 24 DA 51 EB DD   5B 62 A2 6A 56 4D AA FA  ...$.Q..[b.jVM..
#     0010: B1 66 27 B5 19 B8 21 25   E8 FC 75 F9 00 1F EA 11  .f'...!%..u.....
#     0020: 7F DC A9 6D 84 6E 02 BC   FA 57 D4 90 7C 14 CB 1B  ...m.n...W......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.973 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:14:16.974 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:16.974 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:14:16.974 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:16.974 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:14:16.974 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:14:16.974 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.975 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.976 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 D9 D1 F6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:13:58.000 UTC",
#       "not  after"         : "2024-01-24 13:13:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 38 C1 58 EC B5 7E 0B   81 CC 60 A8 B7 D4 8E F4  .8.X......`.....
#           0010: 63 89 2D 1C                                        c.-.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 14 15 ED 2B 0D D6 71   88 00 4C 61 94 8D 8E 45  ....+..q..La...E
#           0010: 60 FC 0E 6A                                        `..j
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:16.999 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 63 B8 18 A1 38 1F 23 24   82 73 56 5A 67 DA 57 DB  c...8.#$.sVZg.W.
#     0010: 01 3C 82 7E 53 5D FE 3B   84 C2 10 25 AE 06 69 15  .<..S].;...%..i.
#     0020: 23 52 96 6E A8 C8 10 70   76 96 C2 80 C6 C2 0A 27  #R.n...pv......'
#     0030: 85 7B 26 1A A6 EE A5 6C   FA 94 8A 97 92 48 92 E3  ..&....l.....H..
#     0040: AA 84 1A 04 2C A0 F4 A6   48 A7 05 9E 3B 9C AC EE  ....,...H...;...
#     0050: 1F EF 17 01 05 C4 6F 45   65 6A FF 88 2F D6 E8 F7  ......oEej../...
#     0060: 05 59 A6 AF F8 92 B3 E7   3F 9D 3D C5 DA 2C DC 28  .Y......?.=..,.(
#     0070: E6 FD 83 32 57 77 C9 E4   E3 C4 B3 3E 9E EE 76 DE  ...2Ww.....>..v.
#     0080: 59 98 47 3A B2 C8 34 F7   21 FF 0E 3C B6 CC 08 0A  Y.G:..4.!..<....
#     0090: 6B 37 53 61 D2 C7 1A 75   36 08 C9 EA 4F AA 7C A3  k7Sa...u6...O...
#     00A0: 6C E2 6D C5 CA 72 5C E9   D0 FA C3 4A 29 E7 2E 23  l.m..r\....J)..#
#     00B0: EE 56 D3 AC 85 40 72 9D   0F 68 53 EE 16 1E A9 9F  .V...@r..hS.....
#     00C0: 8F ED DF E6 90 88 F6 56   FC FF 13 8C FF F0 E5 74  .......V.......t
#     00D0: 17 88 FA 2A 35 1E C8 61   14 BA 86 1A 00 A0 01 2A  ...*5..a.......*
#     00E0: 1D BB 58 EC 05 0F A3 0A   92 E5 EF FE FC C1 39 C1  ..X...........9.
#     00F0: BE EB 50 46 50 05 92 8C   A5 C1 27 89 C9 56 B4 82  ..PFP.....'..V..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:17.000 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A6 94 A1 3A 27 2A AF EA   9F 02 C2 FA 34 7B 61 61  ...:'*......4.aa
#     0010: 9E 1E 7B AA 23 74 0A 95   A2 F8 32 B4 F6 D9 43 00  ....#t....2...C.
#     0020: 29 88 65 82 FB 34 21 CE   16 80 BC 53 86 C5 13 D7  ).e..4!....S....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:14:17.000 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-26 13:14:17.066 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "6A 36 F5 3A 51 94 49 0A D3 F9 19 90 DD 2C E6 33 1B 96 57 DD F4 DB 95 F5 EC 82 DB 88 4F 4D 2F D2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 13:14:17.311 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 13:14:17.313 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (131 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-26 13:14:18.450; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-26 13:14:18.454; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 13:14:18.839 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 D9 D1 F6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:13:58.000 UTC",
#       "not  after"         : "2024-01-24 13:13:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 38 C1 58 EC B5 7E 0B   81 CC 60 A8 B7 D4 8E F4  .8.X......`.....
#           0010: 63 89 2D 1C                                        c.-.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 14 15 ED 2B 0D D6 71   88 00 4C 61 94 8D 8E 45  ....+..q..La...E
#           0010: 60 FC 0E 6A                                        `..j
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 13:14:18.842 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 8C F0 0B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:13:52.000 UTC",
#       "not  after"         : "2024-01-24 13:13:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6A 9E D1 31 0F 09 5C 87   9C C1 6E C3 D4 F4 4D E8  j..1..\...n...M.
#           0010: 5C 9A F5 87                                        \...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 38 C1 58 EC B5 7E 0B   81 CC 60 A8 B7 D4 8E F4  .8.X......`.....
#           0010: 63 89 2D 1C                                        c.-.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 83 4E 4A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:13:50.000 UTC",
#       "not  after"         : "2024-01-24 13:13:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6A 9E D1 31 0F 09 5C 87   9C C1 6E C3 D4 F4 4D E8  j..1..\...n...M.
#           0010: 5C 9A F5 87                                        \...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 13:14:18.854 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/63-6
# Last output:
# INFO  - 2023-10-26 13:14:20.519; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 13:14:20.523; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:14:20.928 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 D9 D1 F6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:13:58.000 UTC",
#     "not  after"         : "2024-01-24 13:13:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 38 C1 58 EC B5 7E 0B   81 CC 60 A8 B7 D4 8E F4  .8.X......`.....
#         0010: 63 89 2D 1C                                        c.-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 14 15 ED 2B 0D D6 71   88 00 4C 61 94 8D 8E 45  ....+..q..La...E
#         0010: 60 FC 0E 6A                                        `..j
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:14:20.932 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 8C F0 0B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:13:52.000 UTC",
#     "not  after"         : "2024-01-24 13:13:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A 9E D1 31 0F 09 5C 87   9C C1 6E C3 D4 F4 4D E8  j..1..\...n...M.
#         0010: 5C 9A F5 87                                        \...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 38 C1 58 EC B5 7E 0B   81 CC 60 A8 B7 D4 8E F4  .8.X......`.....
#         0010: 63 89 2D 1C                                        c.-.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 83 4E 4A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:13:50.000 UTC",
#     "not  after"         : "2024-01-24 13:13:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A 9E D1 31 0F 09 5C 87   9C C1 6E C3 D4 F4 4D E8  j..1..\...n...M.
#         0010: 5C 9A F5 87                                        \...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:14:20.943 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 15685ms
ok 65 stop command for single port in 17624ms
not ok 66 status detects locally running solr in 2668ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 20111 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 17651 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 20111 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 17651 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 249ms
ok 68 listing out files in 3887ms
ok 69 copying files around in 18689ms
ok 70 upconfig in 3953ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1240ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1229ms
not ok 73 Cleanup in 3650ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 20111 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 17651 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 20111 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 17651 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 47s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/b47t42vhou6wy

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 889 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/889/

All tests passed

Build Log:
[...truncated 1318 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:36171/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-26 10:55:02.090; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 10:55:02.095; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-26 10:55:02.903; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 10:55:02.940; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 17038ms
ok 61 start solr with client truststore and security manager in 20406ms
not ok 62 start solr with mTLS needed in 51788ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-Nz9UDa/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 36171 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36171 (pid=501523). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 36172 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 36172 (pid=501632). Happy searching!
#
#     INFO  - 2023-10-26 10:56:06.656; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 10:56:06.660; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 10:56:07.731; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-Nz9UDa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Nz9UDa/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 10:56:07.733; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-Nz9UDa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Nz9UDa/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 10:56:07.734; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(ca,h=[localhost],a=[],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-Nz9UDa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Nz9UDa/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 10:56:07.786 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 B4 E4 B6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 10:55:52.000 UTC",
#     "not  after"         : "2024-01-24 10:55:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#         0010: A4 0B 11 F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 21 DA 90 3F 95 3C 28 E2   05 FD 05 D9 92 8C A5 06  !..?.<(.........
#         0010: 55 5E 69 51                                        U^iQ
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 F1 C2 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 10:55:46.000 UTC",
#     "not  after"         : "2024-01-24 10:55:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 66 9E 94 98 0C 8E 86   0A 76 2F 03 27 1B 76 25  .f.......v/.'.v%
#         0010: 53 42 36 63                                        SB6c
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#         0010: A4 0B 11 F5                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 10:56:07.796 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 F1 C2 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 10:55:46.000 UTC",
#     "not  after"         : "2024-01-24 10:55:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 66 9E 94 98 0C 8E 86   0A 76 2F 03 27 1B 76 25  .f.......v/.'.v%
#         0010: 53 42 36 63                                        SB6c
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#         0010: A4 0B 11 F5                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 88 4A 21",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 10:55:44.000 UTC",
#     "not  after"         : "2024-01-24 10:55:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 66 9E 94 98 0C 8E 86   0A 76 2F 03 27 1B 76 25  .f.......v/.'.v%
#         0010: 53 42 36 63                                        SB6c
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 10:56:07.829 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 10:56:08.376 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 10:56:08.376 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 10:56:08.376 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 10:56:08.376 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 10:56:08.399 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:08.399 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 10:56:08.408 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 10:56:08.409 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:08.424 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:08.444 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:08.444 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:08.444 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:08.446 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "76 D6 75 76 F6 32 B2 4A 57 82 63 EE CE 4B CE AD A2 C0 E5 CA 3D AB A0 57 ED 69 90 68 CF B1 B3 64",
#   "session id"          : "83 8B C8 2F 43 5A BF 5E B3 1D 93 30 DE BA C3 B2 8C AE 8E 8C 31 80 2C 46 19 04 C9 26 98 CD 6D FF",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 73 83 37 6C 79 6A 3E 2C   AA E3 96 06 28 A6 98 63  s.7lyj>,....(..c
#             0010: D0 EE 67 D1 6F 2B A6 90   C2 A4 AC 58 A4 F6 B0 67  ..g.o+.....X...g
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.608 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A9 95 51 D7 18 4F F0 42 72 16 7B A7 77 01 8D B2 DF D5 8E 55 B0 AC B8 80 34 9D 23 24 49 6A 50 36",
#   "session id"          : "83 8B C8 2F 43 5A BF 5E B3 1D 93 30 DE BA C3 B2 8C AE 8E 8C 31 80 2C 46 19 04 C9 26 98 CD 6D FF",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 80 34 CA BE D8 9D 69 9B   65 F3 C6 FB 9E 41 9D 89  .4....i.e....A..
#           0010: 3E 73 B9 F6 9A 05 83 6C   F1 51 44 7C 35 21 B3 77  >s.....l.QD.5!.w
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.609 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.610 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.612 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.612 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.613 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.613 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.613 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.619 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.620 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.620 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.629 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.629 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.632 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.633 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.633 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.633 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.634 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.634 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.634 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.635 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:08.635 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:08.635 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.636 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.636 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.676 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.685 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.695 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.705 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.705 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.705 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.705 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.706 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:08.706 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:08.706 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.713 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.713 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.714 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.714 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.715 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.719 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:08.719 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.722 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 49 C9 8E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 10:55:48.000 UTC",
#       "not  after"         : "2024-01-24 10:55:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#           0010: A4 0B 11 F5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 E0 0A 3B 8A 72 C2 65   AA 62 FA D3 07 97 E9 01  1..;.r.e.b......
#           0010: 3B DB D5 EF                                        ;...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:08.722 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:09.211 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 F1 C2 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 10:55:46.000 UTC",
#     "not  after"         : "2024-01-24 10:55:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 66 9E 94 98 0C 8E 86   0A 76 2F 03 27 1B 76 25  .f.......v/.'.v%
#         0010: 53 42 36 63                                        SB6c
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#         0010: A4 0B 11 F5                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:09.218 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 40 0A 73 88 D8 9C BA 11   A6 3D 98 5E D5 2C A4 39  @.s......=.^.,.9
#     0010: 6E 05 9A 6D 05 57 D4 56   F4 BF 02 2E 17 2D 6B 5A  n..m.W.V.....-kZ
#     0020: 32 A6 9D 48 36 D4 C0 C0   5A E3 5E D9 01 3A F3 A7  2..H6...Z.^..:..
#     0030: 2C F2 FD 1D D3 A8 82 5E   0D B8 AE 8D 39 69 BE 3A  ,......^....9i.:
#     0040: FC 3E D7 5F 08 69 2D 6E   B4 E7 E6 1D 71 B6 7B A2  .>._.i-n....q...
#     0050: 59 6E 87 24 FB F7 63 2B   40 4F 12 63 BC 28 B1 DF  Yn.$..c+@O.c.(..
#     0060: AB 90 E9 8B 5D 0D F2 DC   2F A1 BA D2 32 CE B0 C8  ....].../...2...
#     0070: 47 66 F4 4B 85 D2 C0 43   33 55 52 94 3F AD E9 46  Gf.K...C3UR.?..F
#     0080: EB EA 39 BF D1 6C A7 79   BB 92 29 70 66 F6 35 E0  ..9..l.y..)pf.5.
#     0090: 80 CB 68 5D C3 B8 06 97   BB 98 95 E6 E3 43 F2 F4  ..h].........C..
#     00A0: BE D6 17 E0 0C A1 67 AA   FA 1D 9E 1B 68 A0 76 82  ......g.....h.v.
#     00B0: A1 8D 80 E5 36 84 E8 E3   30 0B F5 0A 6D 9F 7C EE  ....6...0...m...
#     00C0: CD 0A 80 FE D8 69 55 52   D2 01 74 B5 9B 38 70 33  .....iUR..t..8p3
#     00D0: 8D 8B 2B 7F 5F 4E 34 E4   9B 01 1A 01 84 B0 3B D7  ..+._N4.......;.
#     00E0: 29 07 C0 B0 FC 7C E9 7D   98 13 78 7A EB 8C 5D B8  ).........xz..].
#     00F0: 22 7F A3 A2 C7 80 B1 C8   40 9E 38 22 88 53 C9 10  ".......@.8".S..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:09.227 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BC BD BA 66 2F 69 F8 70   67 73 AF 4A E5 56 5B AE  ...f/i.pgs.J.V[.
#     0010: BD 59 50 C6 A1 7A 49 5A   25 03 2A C3 CF 7C A7 CA  .YP..zIZ%.*.....
#     0020: 57 B0 35 50 F5 36 E3 06   DD 69 C0 84 BD CA 05 89  W.5P.6...i......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:09.230 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 10:56:09.231 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:09.231 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 10:56:09.231 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:09.231 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 10:56:09.231 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:09.231 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:09.232 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:09.238 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "12 B4 E4 B6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 10:55:52.000 UTC",
#       "not  after"         : "2024-01-24 10:55:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#           0010: A4 0B 11 F5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 21 DA 90 3F 95 3C 28 E2   05 FD 05 D9 92 8C A5 06  !..?.<(.........
#           0010: 55 5E 69 51                                        U^iQ
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 F1 C2 25",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 10:55:46.000 UTC",
#       "not  after"         : "2024-01-24 10:55:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 66 9E 94 98 0C 8E 86   0A 76 2F 03 27 1B 76 25  .f.......v/.'.v%
#           0010: 53 42 36 63                                        SB6c
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#           0010: A4 0B 11 F5                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:09.275 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 92 B5 92 E0 43 8B A3 91   45 CC E6 21 C5 6F 5A A6  ....C...E..!.oZ.
#     0010: 39 16 2A C7 9B 9C D7 8D   0D 80 F6 2A CD 88 FF BF  9.*........*....
#     0020: 7E 0B F2 DE 08 02 F8 9F   80 26 F2 B3 47 DA AB 00  .........&..G...
#     0030: 64 78 57 20 F2 90 59 B3   05 A1 3A 7E 97 7A 2E 5C  dxW ..Y...:..z.\
#     0040: D9 7B 10 39 C7 5E 61 2F   21 7F BE F5 77 28 6C CC  ...9.^a/!...w(l.
#     0050: E2 74 EC ED 6A AE 7B 11   DD FC 78 48 DD 8A AD 13  .t..j.....xH....
#     0060: A3 AA 5B B5 56 82 A1 2D   65 98 F7 CA C1 FD D8 5A  ..[.V..-e......Z
#     0070: 1C 21 CC 02 67 6B 4C 0C   CF 70 9A 1A B6 C7 86 98  .!..gkL..p......
#     0080: 50 07 D3 E5 60 AD 7E E9   25 BB 41 8F 35 61 11 30  P...`...%.A.5a.0
#     0090: F1 FC 44 D1 A1 4D 13 75   A9 24 DF 0A 3F A5 EF 4B  ..D..M.u.$..?..K
#     00A0: 83 70 12 73 0A 4F BF 7D   81 D2 9B B8 69 48 33 7E  .p.s.O......iH3.
#     00B0: A7 E6 EF C7 A5 A4 F5 FF   1F F5 24 EB 11 BD CF FD  ..........$.....
#     00C0: BC C7 23 0F 7D 96 55 7D   F1 7B D0 BC 12 EB BA 9B  ..#...U.........
#     00D0: 00 CC 39 A2 88 40 76 0A   21 2B 57 00 29 BA 79 DF  ..9..@v.!+W.).y.
#     00E0: 38 BE 47 0F 17 88 D4 70   A2 06 CA 1D 9A 8F 79 C8  8.G....p......y.
#     00F0: ED FB 35 B8 89 0C C5 D9   A4 23 91 A4 32 DB F0 D5  ..5......#..2...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:09.276 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 46 22 A9 4D 35 53 BB 4E   65 85 A2 00 44 12 AA 90  F".M5S.Ne...D...
#     0010: 56 82 30 36 4E 5A 36 0A   E1 06 3D F4 8D 01 76 EF  V.06NZ6...=...v.
#     0020: C0 53 20 31 42 79 E4 CB   91 80 FB 8A 2A B7 FA AC  .S 1By......*...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:09.277 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:09.377 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "38 C8 32 48 8A 51 0E F4 88 69 BE 11 E3 2D F0 62 C0 5B D6 D7 6F AD 9D 66 78 D6 E5 4A 7D 44 C9 54",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 10:56:10.198 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 10:56:10.200 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 10:56:11.628; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 10:56:11.633; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 10:56:11.971; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@743cb8e0(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-Nz9UDa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Nz9UDa/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 10:56:11.973; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-Nz9UDa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Nz9UDa/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 10:56:11.973; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(ca,h=[localhost],a=[],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-Nz9UDa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Nz9UDa/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 10:56:12.011 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 B4 E4 B6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 10:55:52.000 UTC",
#     "not  after"         : "2024-01-24 10:55:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#         0010: A4 0B 11 F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 21 DA 90 3F 95 3C 28 E2   05 FD 05 D9 92 8C A5 06  !..?.<(.........
#         0010: 55 5E 69 51                                        U^iQ
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 F1 C2 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 10:55:46.000 UTC",
#     "not  after"         : "2024-01-24 10:55:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 66 9E 94 98 0C 8E 86   0A 76 2F 03 27 1B 76 25  .f.......v/.'.v%
#         0010: 53 42 36 63                                        SB6c
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#         0010: A4 0B 11 F5                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 10:56:12.015 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 F1 C2 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 10:55:46.000 UTC",
#     "not  after"         : "2024-01-24 10:55:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 66 9E 94 98 0C 8E 86   0A 76 2F 03 27 1B 76 25  .f.......v/.'.v%
#         0010: 53 42 36 63                                        SB6c
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#         0010: A4 0B 11 F5                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 88 4A 21",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 10:55:44.000 UTC",
#     "not  after"         : "2024-01-24 10:55:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 66 9E 94 98 0C 8E 86   0A 76 2F 03 27 1B 76 25  .f.......v/.'.v%
#         0010: 53 42 36 63                                        SB6c
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 10:56:12.029 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 10:56:12.210 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:12.211 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 10:56:12.212 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 10:56:12.213 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:12.217 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:12.229 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:12.229 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:12.229 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:12.231 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A5 E9 E4 F9 8B BE CD C4 C5 C7 32 45 F1 80 18 1A 03 FA 67 98 D8 41 A5 F5 3E 5B A8 40 DC D7 D6 BB",
#   "session id"          : "2D B4 63 D4 87 47 8D DA 5E 61 40 4B F2 C5 67 E6 E2 5A 98 39 FB E3 D2 BD 3A 53 76 92 D5 F8 57 13",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: AC 92 2E 3F A1 F3 8E 82   B3 12 6B F2 EC 7F BE B8  ...?......k.....
#             0010: CE FD 59 E8 75 6D A8 C7   AB 50 A1 EB D0 9A 1F 2C  ..Y.um...P.....,
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.420 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E9 56 F7 F7 98 7E E8 3B 28 42 BB 4E 8D B2 30 86 CB 7F 40 BD 73 FB 3D 1B 57 31 3F 49 DD 11 F3 72",
#   "session id"          : "2D B4 63 D4 87 47 8D DA 5E 61 40 4B F2 C5 67 E6 E2 5A 98 39 FB E3 D2 BD 3A 53 76 92 D5 F8 57 13",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 43 D6 50 C3 B4 3E C7 22   4B ED 33 76 69 EB FB 4C  C.P..>."K.3vi..L
#           0010: 14 B9 E9 59 AA C7 F7 B5   C4 58 CE 63 0D C1 64 72  ...Y.....X.c..dr
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.421 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.421 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.426 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.426 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.426 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.426 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.426 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.426 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.427 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.427 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.438 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.438 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.438 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:12.439 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:12.439 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.447 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.448 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.449 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.453 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.453 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.453 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.453 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.453 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.453 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:12.454 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:12.454 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.455 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.455 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.455 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.456 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.457 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.458 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:12.458 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.462 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 49 C9 8E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 10:55:48.000 UTC",
#       "not  after"         : "2024-01-24 10:55:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#           0010: A4 0B 11 F5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 E0 0A 3B 8A 72 C2 65   AA 62 FA D3 07 97 E9 01  1..;.r.e.b......
#           0010: 3B DB D5 EF                                        ;...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.462 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.524 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 F1 C2 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 10:55:46.000 UTC",
#     "not  after"         : "2024-01-24 10:55:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 66 9E 94 98 0C 8E 86   0A 76 2F 03 27 1B 76 25  .f.......v/.'.v%
#         0010: 53 42 36 63                                        SB6c
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#         0010: A4 0B 11 F5                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.527 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6A B5 EA B2 42 27 81 56   99 E7 54 4C 34 1F 9C C5  j...B'.V..TL4...
#     0010: AC E2 C1 A2 B9 EC 91 AC   7C FF AD 1B 8E 6F 87 84  .............o..
#     0020: 49 45 05 B1 5F A1 E1 0F   73 7A 4D 70 66 5B 2B 25  IE.._...szMpf[+%
#     0030: 79 2C B5 58 97 76 5E 89   11 A2 F6 6C 1F 4F 9E CC  y,.X.v^....l.O..
#     0040: 3B C4 20 BA A0 08 21 86   09 83 43 B7 60 20 ED 0A  ;. ...!...C.` ..
#     0050: A0 F6 48 67 37 B6 D3 40   A3 0E B6 C2 DC 9E 88 54  ..Hg7..@.......T
#     0060: F2 36 AC D1 1A B3 3E 89   21 2D 88 C9 17 80 F3 E6  .6....>.!-......
#     0070: AD ED 43 4C 62 5D 85 90   90 38 91 02 7A 44 EC C9  ..CLb]...8..zD..
#     0080: 13 38 52 79 16 A8 E6 7C   33 83 6F 38 7A 7D 66 FD  .8Ry....3.o8z.f.
#     0090: A8 9C 02 90 0B 0D 41 5F   93 5F 79 E0 D6 A0 2A 67  ......A_._y...*g
#     00A0: 5B C7 F5 44 A6 61 04 EA   5E FE 46 BF 01 C6 14 26  [..D.a..^.F....&
#     00B0: 62 3C D7 F9 92 5D 51 ED   F0 35 CC 98 87 88 03 79  b<...]Q..5.....y
#     00C0: 1A B0 4F 41 80 03 A6 BE   5D 8B 86 BE E2 2B 5C 7E  ..OA....]....+\.
#     00D0: 5B 72 23 5A F0 D6 4D C4   D5 2A BD 31 62 81 3E 9A  [r#Z..M..*.1b.>.
#     00E0: ED 88 4E CE C4 CC 2B 07   B3 F1 65 55 11 63 77 FC  ..N...+...eU.cw.
#     00F0: 89 83 36 50 53 01 81 06   D7 FC 03 90 92 4C F9 AC  ..6PS........L..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.529 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FE EE 45 47 C2 84 3B 41   F3 A0 11 E6 28 C4 0B 38  ..EG..;A....(..8
#     0010: B0 C9 9E 15 57 81 85 86   F3 E7 50 DB 07 D7 3E EA  ....W.....P...>.
#     0020: B6 02 70 3C FC 97 5C A8   B3 B4 11 6E 64 14 34 19  ..p<..\....nd.4.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.530 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 10:56:12.531 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:12.531 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 10:56:12.531 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:12.532 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 10:56:12.532 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:12.532 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.532 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.534 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "12 B4 E4 B6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 10:55:52.000 UTC",
#       "not  after"         : "2024-01-24 10:55:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#           0010: A4 0B 11 F5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 21 DA 90 3F 95 3C 28 E2   05 FD 05 D9 92 8C A5 06  !..?.<(.........
#           0010: 55 5E 69 51                                        U^iQ
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 F1 C2 25",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 10:55:46.000 UTC",
#       "not  after"         : "2024-01-24 10:55:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 66 9E 94 98 0C 8E 86   0A 76 2F 03 27 1B 76 25  .f.......v/.'.v%
#           0010: 53 42 36 63                                        SB6c
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#           0010: A4 0B 11 F5                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.558 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8D A9 F1 7B 74 04 13 91   E2 29 3D AD AC 72 43 61  ....t....)=..rCa
#     0010: 89 0E 23 C3 CC A7 66 00   16 16 28 A1 C7 B1 28 D0  ..#...f...(...(.
#     0020: 1E E5 92 6F A0 84 C7 83   B6 EF 42 53 FB A0 81 89  ...o......BS....
#     0030: 84 A6 A1 4A 15 8A 5D 8C   18 58 C8 2A FC 9F AF 05  ...J..]..X.*....
#     0040: AA D9 28 B6 D2 02 AC 7C   2A 53 2D 1D 9F 8A 65 99  ..(.....*S-...e.
#     0050: 62 DC C9 95 DE 26 E0 3A   98 16 60 32 3F F5 E1 66  b....&.:..`2?..f
#     0060: A2 84 51 AD 0C B5 0A 54   17 0F E2 46 93 AA 59 F4  ..Q....T...F..Y.
#     0070: ED 10 F1 0A 66 21 3C DE   B5 E9 C1 37 74 4B 92 D1  ....f!<....7tK..
#     0080: 31 DD FC 13 FB FF 68 09   50 05 7C 66 F0 6A B7 09  1.....h.P..f.j..
#     0090: 78 87 4E 35 F5 16 A8 32   3D 7F 06 40 75 C0 97 39  x.N5...2=..@u..9
#     00A0: F5 06 D2 A2 D8 D9 41 ED   07 BC EB F3 FA E4 F9 AC  ......A.........
#     00B0: D7 2C E6 98 03 3E 77 A6   3D 0C F5 D2 89 93 DD F8  .,...>w.=.......
#     00C0: 56 86 F1 93 7C DC 65 31   62 AF 4C DB F1 A7 E3 0D  V.....e1b.L.....
#     00D0: CA A5 8B A0 DD B4 AD 4C   64 DD 81 FF 47 09 C0 08  .......Ld...G...
#     00E0: 3C 6A F3 90 48 8F AD 5E   C8 8F 14 83 E7 06 71 6E  <j..H..^......qn
#     00F0: 0D 1D D9 1D 85 48 F3 22   35 D1 F7 5E A3 BD B1 01  .....H."5..^....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.560 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 63 70 0F 7D AC B4 BD 28   41 48 1C 08 FB 3C B7 F0  cp.....(AH...<..
#     0010: 5C D1 63 8C 95 8A 86 91   EA 52 B3 E2 6B 21 4E 43  \.c......R..k!NC
#     0020: A4 7E B2 EC 41 B1 E8 D9   88 EA 58 5C AE 64 7E AB  ....A.....X\.d..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.562 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 10:56:12.634 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 10:56:12.634 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 10:56:12.634 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 10:56:12.634 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:12.650 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "52 63 3E 92 02 0B 55 0F 9B 9D C6 C7 4D 36 32 60 2F 50 CB 28 BD 07 85 EA FC EE 92 27 A2 87 4D AC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 10:56:12.893 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 10:56:12.894 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-26 10:56:25.817; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 10:56:26.163 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 F1 C2 25",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 10:55:46.000 UTC",
#       "not  after"         : "2024-01-24 10:55:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 66 9E 94 98 0C 8E 86   0A 76 2F 03 27 1B 76 25  .f.......v/.'.v%
#           0010: 53 42 36 63                                        SB6c
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F CC 1A 4F 8A C5 68 9C   E9 03 73 55 75 74 AF 5F  ...O..h...sUut._
#           0010: A4 0B 11 F5                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 88 4A 21",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 10:55:44.000 UTC",
#       "not  after"         : "2024-01-24 10:55:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 66 9E 94 98 0C 8E 86   0A 76 2F 03 27 1B 76 25  .f.......v/.'.v%
#           0010: 53 42 36 63                                        SB6c
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 10:56:26.177 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 10:56:26.415 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:26.415 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 10:56:26.417 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 10:56:26.417 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:26.421 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:26.433 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:26.433 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:26.433 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 10:56:26.435 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "36 D9 8E 58 00 EF F5 07 A4 55 BA 25 83 2C 10 DA 03 B3 94 F9 3B F6 72 B9 B7 40 4B C1 4D 7E 0E C9",
#     "session id"          : "C8 C3 DA B7 96 90 F9 24 1C 12 EC DD 8F B6 14 CE 5F 6D 73 D9 8F 95 CD 90 87 BA 50 0A B9 0D EA 21",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 53 B8 B8 E5 D8 78 E6 FD   72 F8 C2 74 AD 7B 4C 88  S....x..r..t..L.
#               0010: AF 6F FF 9D 05 E0 B6 FF   5E 3F 75 A9 FF D1 6A 74  .o......^?u...jt
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.454 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "8D 2F 91 E1 23 B4 D7 5D 90 4F C9 53 6B 73 3A 02 C6 78 D1 E7 FD F1 E0 F1 99 1F D8 80 74 71 4B BF",
#     "session id"          : "C8 C3 DA B7 96 90 F9 24 1C 12 EC DD 8F B6 14 CE 5F 6D 73 D9 8F 95 CD 90 87 BA 50 0A B9 0D EA 21",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2D 16 BD 7D FE FC CF A8   31 39 6B 28 FF AA 3E E0  -.......19k(..>.
#             0010: DD 72 72 34 64 28 F7 5F   6F 97 4A 27 64 51 E0 79  .rr4d(._o.J'dQ.y
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.454 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.454 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.455 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.456 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.456 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.456 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.456 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.456 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.457 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.457 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.460 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.460 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.460 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.461 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.461 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.461 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.463 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.463 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.463 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.464 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:26.464 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:26.464 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.464 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.464 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.473 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.475 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.476 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.480 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.480 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.480 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.480 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.480 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.480 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.480 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:26.481 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:26.481 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.482 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.482 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.482 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.482 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.483 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.483 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:56:26.484 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 10:56:26.486 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [
#

[...truncated too long message...]

cation path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 10:57:39.082 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:36172/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 15062ms
ok 65 stop command for single port in 17874ms
not ok 66 status detects locally running solr in 1561ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 267ms
ok 68 listing out files in 2858ms
ok 69 copying files around in 6662ms
ok 70 upconfig in 2636ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1248ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1271ms
not ok 73 Cleanup in 2580ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 32s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/vjq6sythiu47k

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 888 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/888/

2 tests failed.
FAILED:  org.apache.solr.handler.component.UpdateLogCloudTest.test

Error Message:
java.lang.AssertionError: [-1780804634253721600, -1780804634248478720, 1780804634247430144, 1780804634059735040] expected:<0> but was:<4>

Stack Trace:
java.lang.AssertionError: [-1780804634253721600, -1780804634248478720, 1780804634247430144, 1780804634059735040] expected:<0> but was:<4>
	at __randomizedtesting.SeedInfo.seed([4B83B1251A7A9B1F:C3D78EFFB486F6E7]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.apache.solr.handler.component.UpdateLogCloudTest.implTest(UpdateLogCloudTest.java:135)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:120)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.handler.component.UpdateLogCloudTest.classMethod

Error Message:
java.lang.AssertionError: ObjectTracker found 4 object(s) that were not released!!! [InternalHttpClient, InternalHttpClient, InternalHttpClient, InternalHttpClient]
org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

 expected null, but was:<ObjectTracker found 4 object(s) that were not released!!! [InternalHttpClient, InternalHttpClient, InternalHttpClient, InternalHttpClient]
org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

>

Stack Trace:
java.lang.AssertionError: ObjectTracker found 4 object(s) that were not released!!! [InternalHttpClient, InternalHttpClient, InternalHttpClient, InternalHttpClient]
org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

 expected null, but was:<ObjectTracker found 4 object(s) that were not released!!! [InternalHttpClient, InternalHttpClient, InternalHttpClient, InternalHttpClient]
org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.HttpSolrClient.<init>(HttpSolrClient.java:180)
	at org.apache.solr.client.solrj.impl.HttpSolrClient$Builder.build(HttpSolrClient.java:1055)
	at org.apache.solr.embedded.JettySolrRunner.newClient(JettySolrRunner.java:869)
	at org.apache.solr.handler.component.UpdateLogCloudTest.test(UpdateLogCloudTest.java:93)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invo

[...truncated too long message...]

ame: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 86 9B BC 20 7B AB 5D   79 AB 73 53 9B 7F D8 56  .... ..]y.sS...V
#         0010: 55 3C 64 4C                                        U<dL
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 08:49:59.816 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 98 FF D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 08:49:29.000 UTC",
#     "not  after"         : "2024-01-24 08:49:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 D1 CF 84 C8 9D 49 2C   B0 80 D3 B9 34 50 CF 98  ......I,....4P..
#         0010: 1A D3 2B 27                                        ..+'
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F C2 61 66",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 08:49:31.000 UTC",
#     "not  after"         : "2024-01-24 08:49:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 D1 CF 84 C8 9D 49 2C   B0 80 D3 B9 34 50 CF 98  ......I,....4P..
#         0010: 1A D3 2B 27                                        ..+'
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 64 31 09 FF 20 B4 9D 7D   48 74 26 AD 4C 4F B6 B1  d1.. ...Ht&.LO..
#         0010: 06 61 89 37                                        .a.7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 08:49:59.829 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14384ms
ok 65 stop command for single port in 17154ms
not ok 66 status detects locally running solr in 1510ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 247ms
ok 68 listing out files in 3040ms
ok 69 copying files around in 6559ms
ok 70 upconfig in 2586ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1236ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1255ms
not ok 73 Cleanup in 2491ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.handler.component.UpdateLogCloudTest.test (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.handler.component.UpdateLogCloudTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.handler.component.UpdateLogCloudTest.test" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=4B83B1251A7A9B1F -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8

  - org.apache.solr.handler.component.UpdateLogCloudTest.classMethod (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.handler.component.UpdateLogCloudTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.handler.component.UpdateLogCloudTest.classMethod" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=4B83B1251A7A9B1F -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 5m 29s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/2out6leztfegy

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 887 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/887/

All tests passed

Build Log:
[...truncated 1229 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34777/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-26 06:25:31.259; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 06:25:31.264; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-26 06:25:32.025; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 06:25:32.075; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 16654ms
ok 61 start solr with client truststore and security manager in 19680ms
not ok 62 start solr with mTLS needed in 52197ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-WCJMrw/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 34777 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34777 (pid=1457221). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 34778 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 34778 (pid=1457332). Happy searching!
#
#     INFO  - 2023-10-26 06:26:34.015; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 06:26:34.026; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 06:26:35.161; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-WCJMrw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WCJMrw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 06:26:35.164; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-WCJMrw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WCJMrw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 06:26:35.165; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-WCJMrw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WCJMrw/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 06:26:35.213 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D F0 EB 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 06:26:20.000 UTC",
#     "not  after"         : "2024-01-24 06:26:20.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#         0010: 3F A0 A1 8A                                        ?...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 50 A2 BB 62 20 F7 6B   D2 FC C0 F2 25 C4 2A 4F  .P..b .k....%.*O
#         0010: 70 62 F3 EE                                        pb..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C BC FE 16",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 06:26:13.000 UTC",
#     "not  after"         : "2024-01-24 06:26:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 8F 49 CE 33 7F 40 B9   ED A7 BA 2F CA 79 33 44  ..I.3.@..../.y3D
#         0010: 33 CF 0B FB                                        3...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#         0010: 3F A0 A1 8A                                        ?...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 06:26:35.218 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C BC FE 16",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 06:26:13.000 UTC",
#     "not  after"         : "2024-01-24 06:26:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 8F 49 CE 33 7F 40 B9   ED A7 BA 2F CA 79 33 44  ..I.3.@..../.y3D
#         0010: 33 CF 0B FB                                        3...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#         0010: 3F A0 A1 8A                                        ?...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 91 E0 16",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 06:26:11.000 UTC",
#     "not  after"         : "2024-01-24 06:26:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 8F 49 CE 33 7F 40 B9   ED A7 BA 2F CA 79 33 44  ..I.3.@..../.y3D
#         0010: 33 CF 0B FB                                        3...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 06:26:35.249 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 06:26:35.829 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:35.829 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 06:26:35.833 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 06:26:35.833 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:35.847 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:35.863 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:35.864 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:35.864 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:35.870 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EB 3C 75 65 53 1A D2 19 8A 60 9A 4F F5 6B B7 D6 94 36 9E D7 CF 3A D6 14 FF F6 91 8A EF 4D 04 F8",
#   "session id"          : "73 26 20 36 C4 68 4C 11 60 FB 44 B4 2B 97 85 FB 00 15 1C 13 45 F4 98 1D C8 2B 80 17 78 7E E4 60",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: BF 47 71 E6 AA 9E 99 C8   A0 7A DF F2 3D FD 2E 14  .Gq......z..=...
#             0010: 73 25 73 EB 1E F4 00 02   6A 69 F0 F8 69 91 72 72  s%s.....ji..i.rr
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.085 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4F 21 71 21 FB 4D 06 58 16 2A 7D 65 ED D0 36 9F E7 D3 E2 1B 8F D5 1F C0 B0 F5 20 DF 36 6F 88 D7",
#   "session id"          : "73 26 20 36 C4 68 4C 11 60 FB 44 B4 2B 97 85 FB 00 15 1C 13 45 F4 98 1D C8 2B 80 17 78 7E E4 60",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 77 42 DA 2F 4B 1A 58 CD   92 01 05 19 67 0D F3 29  wB./K.X.....g..)
#           0010: E3 1A C5 69 99 B6 5F 10   2F FC BA 47 D4 11 AC 3E  ...i.._./..G...>
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.094 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.095 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.096 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.099 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.100 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.100 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.100 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.100 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:36.101 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:36.101 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.119 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.120 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.122 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.131 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.131 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.131 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.132 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.132 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.133 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:36.134 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:36.134 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.428 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.429 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.429 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.509 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.510 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.511 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:36.511 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.517 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 0C 48 CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 06:26:16.000 UTC",
#       "not  after"         : "2024-01-24 06:26:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#           0010: 3F A0 A1 8A                                        ?...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 0D 4B 85 B8 AB 88 16   59 13 56 4A F0 CC F2 E5  ..K.....Y.VJ....
#           0010: C0 D3 19 73                                        ...s
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.517 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:26:36.571 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:26:36.572 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:26:36.572 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:26:36.572 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.607 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C BC FE 16",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 06:26:13.000 UTC",
#     "not  after"         : "2024-01-24 06:26:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 8F 49 CE 33 7F 40 B9   ED A7 BA 2F CA 79 33 44  ..I.3.@..../.y3D
#         0010: 33 CF 0B FB                                        3...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#         0010: 3F A0 A1 8A                                        ?...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.613 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6F 94 51 5D 29 61 FF FB   D5 BA 2B D7 65 02 10 4C  o.Q])a....+.e..L
#     0010: D2 82 8B E7 B1 45 B2 B4   20 37 17 6E A8 E5 21 F6  .....E.. 7.n..!.
#     0020: 9E 58 32 36 30 50 38 38   86 36 EC E1 8E 2A 69 57  .X260P88.6...*iW
#     0030: DE E4 10 3A 21 3C 75 28   AA 2C 2C AC 9B BE 79 F1  ...:!<u(.,,...y.
#     0040: F6 E2 AA 93 7A A7 3B CC   84 FD B5 84 C6 C9 67 49  ....z.;.......gI
#     0050: E9 F6 DC 31 49 E7 7E FD   24 91 3E DD 5C 41 F6 0B  ...1I...$.>.\A..
#     0060: 13 56 42 D7 3E 5A 80 B0   AC 3C 0B E0 0A BC A9 13  .VB.>Z...<......
#     0070: 3E 4C DD B4 4F 82 EA 20   77 67 DF 11 27 7A 52 92  >L..O.. wg..'zR.
#     0080: 7D 0B 5B E1 3E CF AB 95   02 F0 FF 12 E8 CF F7 E0  ..[.>...........
#     0090: C5 39 AF 3C 5A 28 29 E6   FC D8 89 D2 B9 55 DB FC  .9.<Z()......U..
#     00A0: 19 3E 47 C0 25 8A FF E2   1D CE 41 88 2D B0 33 77  .>G.%.....A.-.3w
#     00B0: 55 38 F3 EF 55 9C 70 6C   6F 65 3D 95 01 04 FA B8  U8..U.ploe=.....
#     00C0: 7B 70 7A 3E BC E4 55 CC   E3 50 F9 DB EA 6B 63 89  .pz>..U..P...kc.
#     00D0: 0A 47 4A ED 96 11 A2 5F   28 9D DB B9 ED 8E 20 BA  .GJ...._(..... .
#     00E0: 06 8F 7D A0 CF F0 45 65   B1 AF E0 F9 3E F7 45 C6  ......Ee....>.E.
#     00F0: D5 B0 52 F9 AB FD AC 6E   60 52 C5 20 6C E2 35 16  ..R....n`R. l.5.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.615 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 89 60 A0 8C 6F 3D EB CA   BA FB D5 D6 88 D8 CB C7  .`..o=..........
#     0010: E4 6A 0C A2 E1 40 CA 14   39 94 C2 C4 04 29 95 89  .j...@..9....)..
#     0020: 63 35 49 25 4A 4B B0 F5   25 37 78 66 6E AD FD DF  c5I%JK..%7xfn...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.623 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 06:26:36.624 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:36.624 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 06:26:36.624 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:36.625 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 06:26:36.625 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:36.625 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.625 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.636 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D F0 EB 8D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 06:26:20.000 UTC",
#       "not  after"         : "2024-01-24 06:26:20.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#           0010: 3F A0 A1 8A                                        ?...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 50 A2 BB 62 20 F7 6B   D2 FC C0 F2 25 C4 2A 4F  .P..b .k....%.*O
#           0010: 70 62 F3 EE                                        pb..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C BC FE 16",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 06:26:13.000 UTC",
#       "not  after"         : "2024-01-24 06:26:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 8F 49 CE 33 7F 40 B9   ED A7 BA 2F CA 79 33 44  ..I.3.@..../.y3D
#           0010: 33 CF 0B FB                                        3...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#           0010: 3F A0 A1 8A                                        ?...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.689 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 62 4A 11 DE 43 D2 4C 6C   6D 05 D4 75 B9 83 FA 32  bJ..C.Llm..u...2
#     0010: 11 C5 8B 17 CA 87 5E 31   5F 0F 3D 5F AB 55 19 26  ......^1_.=_.U.&
#     0020: 2C 95 AB 35 CF 58 1D FA   FB 6A 5C 32 25 84 4A E5  ,..5.X...j\2%.J.
#     0030: 33 A5 97 1D 18 DD E5 A9   D6 EE A9 C4 30 41 E1 8C  3...........0A..
#     0040: A4 7F ED 68 1A 46 C1 64   E0 1F C4 CE 87 5B 23 0E  ...h.F.d.....[#.
#     0050: B5 1F 16 4C 5C EA 92 7F   FC FC 99 8D EA 41 D7 39  ...L\........A.9
#     0060: 55 6B 35 08 3C 4E FE 0E   E6 E5 07 94 83 E9 92 45  Uk5.<N.........E
#     0070: 18 F8 BF AF FF 17 8F 22   BB F1 55 04 D0 97 53 59  ......."..U...SY
#     0080: 11 00 74 90 C6 6E 72 B0   49 4C 2E 20 C9 A5 90 C6  ..t..nr.IL. ....
#     0090: 0E 76 FD 1D C1 01 FD DA   CD 69 90 00 35 32 25 CA  .v.......i..52%.
#     00A0: 51 2C BD 55 EF C2 05 61   69 A0 AF 7C 15 24 E5 29  Q,.U...ai....$.)
#     00B0: 4B F7 D4 03 A0 00 8D D3   96 FD 6B 8B 57 26 CC 76  K.........k.W&.v
#     00C0: E3 67 27 22 A3 7E 04 98   79 44 52 E1 80 FB 27 5A  .g'"....yDR...'Z
#     00D0: 87 30 F3 2C BB 05 DF A1   8C 3F 63 66 55 79 D9 A0  .0.,.....?cfUy..
#     00E0: 6F 92 2B 58 EE 0E 36 15   B1 03 49 53 35 33 4F 92  o.+X..6...IS53O.
#     00F0: A8 8B DA 0D 12 2E 5B 9E   FD 70 F1 30 06 B7 1B 6D  ......[..p.0...m
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.691 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 54 08 1D 9A F4 88 2F 7C   9A 70 73 A3 7D 04 1D 4E  T...../..ps....N
#     0010: 80 F3 41 54 C8 E4 2C 66   57 F8 E2 69 8F A6 28 D3  ..AT..,fW..i..(.
#     0020: CD EC 72 D5 52 30 A2 F9   10 4C F8 B3 A2 64 B6 43  ..r.R0...L...d.C
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.696 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:36.819 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "60 BD 02 24 A4 ED 2D FA 3C 64 9E 67 A5 B8 51 A7 E9 8B 53 14 EB AB 82 D0 F8 FC E4 94 77 A2 56 AC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 06:26:37.532 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 06:26:37.533 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 06:26:39.134; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 06:26:39.138; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 06:26:39.479; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3c0fae6c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-WCJMrw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WCJMrw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 06:26:39.481; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-WCJMrw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WCJMrw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 06:26:39.482; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(ca,h=[localhost],a=[],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-WCJMrw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WCJMrw/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 06:26:39.521 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D F0 EB 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 06:26:20.000 UTC",
#     "not  after"         : "2024-01-24 06:26:20.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#         0010: 3F A0 A1 8A                                        ?...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 50 A2 BB 62 20 F7 6B   D2 FC C0 F2 25 C4 2A 4F  .P..b .k....%.*O
#         0010: 70 62 F3 EE                                        pb..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C BC FE 16",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 06:26:13.000 UTC",
#     "not  after"         : "2024-01-24 06:26:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 8F 49 CE 33 7F 40 B9   ED A7 BA 2F CA 79 33 44  ..I.3.@..../.y3D
#         0010: 33 CF 0B FB                                        3...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#         0010: 3F A0 A1 8A                                        ?...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 06:26:39.525 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C BC FE 16",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 06:26:13.000 UTC",
#     "not  after"         : "2024-01-24 06:26:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 8F 49 CE 33 7F 40 B9   ED A7 BA 2F CA 79 33 44  ..I.3.@..../.y3D
#         0010: 33 CF 0B FB                                        3...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#         0010: 3F A0 A1 8A                                        ?...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 91 E0 16",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 06:26:11.000 UTC",
#     "not  after"         : "2024-01-24 06:26:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 8F 49 CE 33 7F 40 B9   ED A7 BA 2F CA 79 33 44  ..I.3.@..../.y3D
#         0010: 33 CF 0B FB                                        3...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 06:26:39.537 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 06:26:39.711 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:39.711 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 06:26:39.716 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 06:26:39.716 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:39.819 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:39.831 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:39.831 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:39.832 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:39.834 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C4 7E 0A 3E 37 38 4D B2 BD EA 84 EC 0F 58 9E 94 09 BB 59 7D 75 CE 20 62 6C 89 04 B3 24 FD E0 B2",
#   "session id"          : "53 00 19 B4 44 5D 50 83 EB B4 8C 99 C1 13 75 36 7D AE A8 A3 5B 96 B2 FE E9 0C 93 BC B3 6A E4 4A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D8 FF 6E B7 A2 66 11 A7   6E 47 18 44 78 3B 7F 4D  ..n..f..nG.Dx;.M
#             0010: 0B E7 FA A5 30 35 AA F4   74 1B BA A3 A3 19 74 58  ....05..t.....tX
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.920 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B8 D4 36 8F EB 80 0A 76 36 8F 19 98 2B 96 42 06 C7 50 58 3F E2 81 DB 95 1F 82 45 1F 50 80 26 92",
#   "session id"          : "53 00 19 B4 44 5D 50 83 EB B4 8C 99 C1 13 75 36 7D AE A8 A3 5B 96 B2 FE E9 0C 93 BC B3 6A E4 4A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 8E 92 49 F6 D8 17 CA 88   02 D0 A5 13 DC 6E 3A 46  ..I..........n:F
#           0010: FF 62 2A 03 C9 F9 CC 6E   02 0B 7F 4E 87 14 71 38  .b*....n...N..q8
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.921 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.921 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.922 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.923 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.923 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.925 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.925 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.927 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.934 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.935 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.935 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.935 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.935 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.936 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.936 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.937 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.937 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:39.937 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:39.937 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.937 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.937 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.961 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.970 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:26:39.971 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:26:39.971 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:26:39.972 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:26:39.972 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.981 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.984 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.985 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.985 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.985 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.985 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.985 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.985 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:39.985 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:39.985 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.986 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.987 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.987 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.987 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.988 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.989 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:39.989 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.991 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 0C 48 CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 06:26:16.000 UTC",
#       "not  after"         : "2024-01-24 06:26:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#           0010: 3F A0 A1 8A                                        ?...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 0D 4B 85 B8 AB 88 16   59 13 56 4A F0 CC F2 E5  ..K.....Y.VJ....
#           0010: C0 D3 19 73                                        ...s
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:39.992 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:40.102 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C BC FE 16",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 06:26:13.000 UTC",
#     "not  after"         : "2024-01-24 06:26:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 8F 49 CE 33 7F 40 B9   ED A7 BA 2F CA 79 33 44  ..I.3.@..../.y3D
#         0010: 33 CF 0B FB                                        3...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#         0010: 3F A0 A1 8A                                        ?...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:40.105 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 54 0C 95 9F B1 B4 28 9B   DB 0B B2 32 BA 1E CA 86  T.....(....2....
#     0010: 39 93 E7 4A 92 F5 36 D0   51 1E EB 4E C4 4C 9B E4  9..J..6.Q..N.L..
#     0020: 17 15 D8 DD C1 71 5C F6   C5 E1 02 D8 40 FB 2A 5D  .....q\.....@.*]
#     0030: AA 7F D2 B0 18 26 F6 EB   D8 E6 1C 34 3D 33 7B EF  .....&.....4=3..
#     0040: 58 BA 63 A8 2C 0D BD 26   15 B1 25 E1 D0 C6 88 F1  X.c.,..&..%.....
#     0050: 76 EA BE 9F CC 0D 0B 5D   6A C8 F3 1D E8 BA 49 0E  v......]j.....I.
#     0060: 25 D6 EE 10 ED AE 8F 0C   7D A6 50 EA 98 D1 94 76  %.........P....v
#     0070: 84 F8 0E F7 C7 94 04 8F   55 DF DB 69 32 51 1F 15  ........U..i2Q..
#     0080: 4B 38 D9 2A 46 3A DC CF   78 61 44 A3 A0 88 66 38  K8.*F:..xaD...f8
#     0090: AE 76 DC AC 39 5E E1 25   56 8A 11 28 6A 4A 38 EF  .v..9^.%V..(jJ8.
#     00A0: 3C 2C 4F 2F DC BA 69 34   DC 08 51 89 30 00 A1 D6  <,O/..i4..Q.0...
#     00B0: 10 52 88 4E 95 9B 95 24   16 3E C8 23 46 26 68 A2  .R.N...$.>.#F&h.
#     00C0: 22 98 1E 30 B9 9D 47 C2   75 7C C2 61 29 CF AE 78  "..0..G.u..a)..x
#     00D0: F4 B3 51 5C 8B 65 B7 1F   30 F8 5D C4 A0 9B F8 F4  ..Q\.e..0.].....
#     00E0: C3 0D 3A 03 59 64 6E 7D   01 D7 A1 F8 62 72 80 16  ..:.Ydn.....br..
#     00F0: 9B 79 F0 7E 8F D3 30 CF   8A EB 17 EA FC E8 3A 63  .y....0.......:c
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:40.107 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 21 79 2B A6 BA 40 44 A6   0D 59 D8 21 49 82 B0 A1  !y+..@D..Y.!I...
#     0010: B5 ED 3B DE E0 F9 53 5E   4E 22 6A 1B 44 55 21 F0  ..;...S^N"j.DU!.
#     0020: 34 A0 03 61 90 A9 90 91   86 05 A4 36 E1 AD 0E 74  4..a.......6...t
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:40.108 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 06:26:40.109 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:40.109 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 06:26:40.110 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:40.110 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 06:26:40.110 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:40.110 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:40.110 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:40.112 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D F0 EB 8D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 06:26:20.000 UTC",
#       "not  after"         : "2024-01-24 06:26:20.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#           0010: 3F A0 A1 8A                                        ?...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 50 A2 BB 62 20 F7 6B   D2 FC C0 F2 25 C4 2A 4F  .P..b .k....%.*O
#           0010: 70 62 F3 EE                                        pb..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C BC FE 16",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 06:26:13.000 UTC",
#       "not  after"         : "2024-01-24 06:26:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 8F 49 CE 33 7F 40 B9   ED A7 BA 2F CA 79 33 44  ..I.3.@..../.y3D
#           0010: 33 CF 0B FB                                        3...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#           0010: 3F A0 A1 8A                                        ?...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:40.252 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 19 5F 37 21 32 71 6C 6F   89 54 51 96 5C DE C4 3C  ._7!2qlo.TQ.\..<
#     0010: AC DE 73 B2 0F 08 C1 21   FA 54 F2 FC C3 F8 58 E3  ..s....!.T....X.
#     0020: E9 E4 EE B4 D1 39 7A 10   6D 12 D6 65 8D 1E 1C 0A  .....9z.m..e....
#     0030: 15 4C 4E EB B5 F4 96 AF   98 B0 08 F9 28 AB 06 A6  .LN.........(...
#     0040: 90 6B 2C 5B AE 52 5F D4   2B C4 AB 76 53 C1 D5 9A  .k,[.R_.+..vS...
#     0050: B4 58 D5 00 A6 12 6C 95   48 E1 79 51 9E 1D 8E 14  .X....l.H.yQ....
#     0060: 1C 0F 53 5D 7A AD BF 42   E3 06 5A 6E AA 05 61 A8  ..S]z..B..Zn..a.
#     0070: C1 83 D5 9A FE A4 2A EB   C4 8E A5 2E 2B 6E 64 D7  ......*.....+nd.
#     0080: 72 68 5F 69 3B 97 ED 57   DE E0 8E A8 14 42 B1 66  rh_i;..W.....B.f
#     0090: A9 F0 FE 5F A2 76 A2 7A   A8 9F BE 07 B3 9B CA B8  ..._.v.z........
#     00A0: 89 FA 32 6E 68 DB A2 F3   12 12 E9 54 5F CB 09 CA  ..2nh......T_...
#     00B0: E9 07 0E 83 CB F1 E8 AA   62 B3 68 AB D4 18 9C DF  ........b.h.....
#     00C0: 9C C1 7C 5B 97 75 A4 EA   B5 0F A0 25 BC BD 3D FC  ...[.u.....%..=.
#     00D0: 49 68 C9 EE 5A F2 67 C7   25 A7 6F 1A 86 85 9C 8F  Ih..Z.g.%.o.....
#     00E0: CE D0 EA 96 6D 86 8A 03   3B A8 10 EA 94 9A 50 CA  ....m...;.....P.
#     00F0: 4A 23 B0 6D C6 F0 78 D2   8E 53 2F 6D A6 E7 7E FA  J#.m..x..S/m....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:40.253 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2A 31 EF A8 76 89 3B 85   F1 0D 1C CE 4B C3 D5 ED  *1..v.;.....K...
#     0010: 26 B2 C0 21 B3 DE 9E 44   6E BD 80 5B 23 EB 4C AB  &..!...Dn..[#.L.
#     0020: 54 99 7F C4 7B C5 4E BC   CD 31 99 3C 71 BA 7B 44  T.....N..1.<q..D
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:40.254 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:40.296 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C8 A2 A1 B6 75 EF E8 14 EA 59 46 C6 D9 C2 16 9B E4 8D E1 33 E2 DA 77 D1 72 14 9E 08 E7 B4 48 38",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 06:26:40.562 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 06:26:40.563 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-26 06:26:53.704; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 06:26:54.053 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C BC FE 16",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 06:26:13.000 UTC",
#       "not  after"         : "2024-01-24 06:26:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 8F 49 CE 33 7F 40 B9   ED A7 BA 2F CA 79 33 44  ..I.3.@..../.y3D
#           0010: 33 CF 0B FB                                        3...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 A0 5E 8A 6D DF 65 0C   03 3D F1 AD AF BF C9 57  ..^.m.e..=.....W
#           0010: 3F A0 A1 8A                                        ?...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 91 E0 16",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 06:26:11.000 UTC",
#       "not  after"         : "2024-01-24 06:26:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 8F 49 CE 33 7F 40 B9   ED A7 BA 2F CA 79 33 44  ..I.3.@..../.y3D
#           0010: 33 CF 0B FB                                        3...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 06:26:54.066 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:26:54.133 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:26:54.133 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:26:54.133 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:26:54.134 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 06:26:54.239 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:54.239 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 06:26:54.241 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 06:26:54.241 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:54.245 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:54.256 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:54.257 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:54.257 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 06:26:54.259 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "22 C3 0E 00 E8 7F BD 36 B0 6E 18 A1 A6 53 A9 D7 E9 61 BC E3 6E 53 2C 98 9E 85 F8 14 90 3F EF B5",
#     "session id"          : "6A 57 41 CA 5C 4D 2E B2 EA 37 C8 54 6A F2 54 FB 43 62 C3 35 31 7D 6B 00 B2 BB 2B FF 72 53 B9 A3",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 11 BE 7F 62 1F A5 D2 BB   F7 E6 77 71 CF 6B 94 F2  ...b......wq.k..
#               0010: 4E 0B AD 4B 7B F0 77 58   35 6B 99 B3 48 89 78 5B  N..K..wX5k..H.x[
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.286 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "52 CA 9C CC D3 63 17 2B 4E AF 60 64 35 4A 07 56 99 F0 C5 28 EA 03 AE 48 81 B4 80 94 E4 A6 09 4A",
#     "session id"          : "6A 57 41 CA 5C 4D 2E B2 EA 37 C8 54 6A F2 54 FB 43 62 C3 35 31 7D 6B 00 B2 BB 2B FF 72 53 B9 A3",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: C6 B3 6F E6 51 1D 13 57   9F 83 C9 54 95 42 F9 E8  ..o.Q..W...T.B..
#             0010: 4F 94 3D 7C 0D 72 CA BE   38 B4 1D F2 41 3C B7 24  O.=..r..8...A<.$
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.286 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.286 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.288 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.288 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.288 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.288 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.288 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.289 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.289 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.289 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.295 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.295 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.295 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.295 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.295 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.295 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.295 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.296 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.296 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.296 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:54.296 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:54.296 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.296 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.296 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.304 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.305 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.309 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.313 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.313 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.313 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.313 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.313 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:54.313 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:26:54.314 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.315 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.315 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.315 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.315 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.316 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 06:26:54.317 U

[...truncated too long message...]

.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 06:28:07.980 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:28:08.038 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:28:08.039 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:28:08.039 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 06:28:08.039 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34778/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14493ms
ok 65 stop command for single port in 18302ms
ok 66 status detects locally running solr in 7726ms
ok 67 status does not expose cli parameters to end user in 243ms
ok 68 listing out files in 3002ms
ok 69 copying files around in 6644ms
ok 70 upconfig in 2782ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1259ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1252ms
ok 73 Cleanup in 1277ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 38s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/7oqsbgoolxh24

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 886 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/886/

All tests passed

Build Log:
[...truncated 1227 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33087/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-26 01:38:14.713; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 01:38:14.718; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-26 01:38:15.539; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 01:38:15.578; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 18074ms
ok 61 start solr with client truststore and security manager in 19845ms
not ok 62 start solr with mTLS needed in 54017ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-A8Dbxh/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 33087 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33087 (pid=865043). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 33088 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33088 (pid=865152). Happy searching!
#
#     INFO  - 2023-10-26 01:39:19.576; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 01:39:19.587; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 01:39:20.263; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-A8Dbxh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-A8Dbxh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 01:39:20.266; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-A8Dbxh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-A8Dbxh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 01:39:20.266; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-A8Dbxh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-A8Dbxh/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 01:39:20.300 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 6A E9 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 01:39:05.000 UTC",
#     "not  after"         : "2024-01-24 01:39:05.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#         0010: 0B 09 82 B9                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 CB F9 E5 29 08 62 5B   FC F5 B0 B8 0D 39 B4 3C  a...).b[.....9.<
#         0010: D4 A4 55 C8                                        ..U.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 69 15 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 01:38:58.000 UTC",
#     "not  after"         : "2024-01-24 01:38:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 89 3D 23 87 F0 A5 12   E4 C1 FB 60 9D 4A AF 0E  ..=#.......`.J..
#         0010: EC 72 06 7F                                        .r..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#         0010: 0B 09 82 B9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 01:39:20.304 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 4C DF 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 01:38:56.000 UTC",
#     "not  after"         : "2024-01-24 01:38:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 89 3D 23 87 F0 A5 12   E4 C1 FB 60 9D 4A AF 0E  ..=#.......`.J..
#         0010: EC 72 06 7F                                        .r..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 69 15 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 01:38:58.000 UTC",
#     "not  after"         : "2024-01-24 01:38:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 89 3D 23 87 F0 A5 12   E4 C1 FB 60 9D 4A AF 0E  ..=#.......`.J..
#         0010: EC 72 06 7F                                        .r..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#         0010: 0B 09 82 B9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 01:39:20.317 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 01:39:20.570 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 01:39:20.571 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 01:39:20.571 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 01:39:20.571 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 01:39:20.589 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:20.589 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 01:39:20.591 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 01:39:20.591 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:20.599 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:20.627 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:20.627 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:20.628 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:20.629 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E3 93 83 4C 3F 2B BF AA 0A 92 3D E7 7D 2B C9 2A C1 9D DB D1 22 BF 07 9B 6D 61 B8 3E 22 5F 2C E1",
#   "session id"          : "9C 21 C0 B9 5A 4E B2 0E 21 00 87 01 C0 D7 37 1C 07 48 B8 D8 A2 03 50 C5 76 1E 21 D8 9F A3 68 F3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B2 81 A6 1E 3F 72 6D 5C   6F 18 AF 40 5A 38 ED CC  ....?rm\o..@Z8..
#             0010: D5 E5 2A 3E C0 66 6B 20   52 0D CB 5F 10 18 F6 5A  ..*>.fk R.._...Z
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.814 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C6 AE CB 9E 89 B0 E4 E9 92 E1 C9 FB E1 E3 DD 44 B1 98 82 AF FB 80 59 43 2F BB 01 F8 8D 10 26 03",
#   "session id"          : "9C 21 C0 B9 5A 4E B2 0E 21 00 87 01 C0 D7 37 1C 07 48 B8 D8 A2 03 50 C5 76 1E 21 D8 9F A3 68 F3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 96 D2 C2 76 66 41 3A 80   03 8C 83 66 7E 7C 31 B3  ...vfA:....f..1.
#           0010: BC 30 CB D2 EE A0 BD B0   78 F3 89 D1 F3 A0 90 00  .0......x.......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.814 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.814 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.822 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.822 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.823 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.832 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.833 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.833 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.833 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.833 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.833 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.833 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.833 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.833 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.834 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:20.834 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:20.835 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.850 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.861 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:20.871 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.076 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.077 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.077 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.077 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.077 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.077 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.077 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:21.077 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:21.077 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.079 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.079 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.079 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.079 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.080 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.080 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:21.080 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.083 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D EB 19 2B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 01:39:01.000 UTC",
#       "not  after"         : "2024-01-24 01:39:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#           0010: 0B 09 82 B9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8E 02 D4 24 3F 97 DC 40   BD 09 60 21 0D 93 E9 0E  ...$?..@..`!....
#           0010: CD 87 D3 A6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.083 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.220 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 69 15 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 01:38:58.000 UTC",
#     "not  after"         : "2024-01-24 01:38:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 89 3D 23 87 F0 A5 12   E4 C1 FB 60 9D 4A AF 0E  ..=#.......`.J..
#         0010: EC 72 06 7F                                        .r..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#         0010: 0B 09 82 B9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.231 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 70 A9 17 1A AD CF 7E 77   C9 74 41 59 19 C7 C4 B1  p......w.tAY....
#     0010: EA 88 DA CC E5 6D 00 0B   94 D7 2C FD 46 C3 A5 11  .....m....,.F...
#     0020: 7C EB 86 28 0E 20 93 4B   1F CA 03 B5 09 4D F6 22  ...(. .K.....M."
#     0030: F4 4B 3A D9 BC 65 C8 D1   CE E4 34 30 2E 44 F7 24  .K:..e....40.D.$
#     0040: 99 30 70 60 94 1A CC C0   18 83 C2 AA A1 AD 61 21  .0p`..........a!
#     0050: 87 CA F0 DC 13 70 F6 96   DF 87 50 7C 8E 88 6C C4  .....p....P...l.
#     0060: 11 14 BA FA AC 46 8C CD   87 A4 FD F7 02 E0 99 3B  .....F.........;
#     0070: 47 DC DE 13 2B B9 28 B0   A0 33 2B FD 7D 45 82 21  G...+.(..3+..E.!
#     0080: EA BC BD 22 D2 EE 07 98   F8 4D E8 6C C3 7B 62 0B  ...".....M.l..b.
#     0090: 36 D5 FA 7B 68 CE A5 87   D2 52 46 74 17 54 BB B6  6...h....RFt.T..
#     00A0: 16 61 66 19 B6 0C 28 DB   09 7D 0C CE 6B 3B 01 95  .af...(.....k;..
#     00B0: 6D AB 49 AB 35 2F 00 58   1A EC 17 05 26 EB 04 1C  m.I.5/.X....&...
#     00C0: 9E 3C 22 CF 7A 42 53 58   DD 6E 57 F9 AD 9A D1 3E  .<".zBSX.nW....>
#     00D0: CC CD CD D0 69 A4 7C A9   EE CD B8 03 9B 10 12 2F  ....i........../
#     00E0: 95 CA 23 37 AC 9D 4D E8   8A 42 5F 8C 8D 38 D9 8D  ..#7..M..B_..8..
#     00F0: D7 C9 B6 61 CE 60 A0 9C   93 5E 32 8F 21 A3 1E D7  ...a.`...^2.!...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.235 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D6 C0 19 C0 5E 87 DE E3   7F 53 E2 14 2E FD 7A 84  ....^....S....z.
#     0010: AC C3 1A 77 E5 B7 73 4F   FD A1 47 EF 7F AC EF D4  ...w..sO..G.....
#     0020: B1 9A 01 85 C2 1C B0 78   23 28 51 27 8F FD BF 35  .......x#(Q'...5
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.237 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 01:39:21.238 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:21.238 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 01:39:21.238 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:21.238 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 01:39:21.238 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:21.238 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.239 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.245 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 6A E9 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 01:39:05.000 UTC",
#       "not  after"         : "2024-01-24 01:39:05.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#           0010: 0B 09 82 B9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 61 CB F9 E5 29 08 62 5B   FC F5 B0 B8 0D 39 B4 3C  a...).b[.....9.<
#           0010: D4 A4 55 C8                                        ..U.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1D 69 15 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 01:38:58.000 UTC",
#       "not  after"         : "2024-01-24 01:38:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 89 3D 23 87 F0 A5 12   E4 C1 FB 60 9D 4A AF 0E  ..=#.......`.J..
#           0010: EC 72 06 7F                                        .r..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#           0010: 0B 09 82 B9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.314 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 25 69 DF CC 03 C2 4F 42   A8 17 BF 26 6F CD 67 73  %i....OB...&o.gs
#     0010: A3 0B 9C 05 00 48 CE A2   DE 70 3A 5B 40 7A 55 D6  .....H...p:[@zU.
#     0020: 67 90 59 5E AB 81 98 2F   51 61 D7 D7 11 ED FE 77  g.Y^.../Qa.....w
#     0030: 54 8A 24 0B 97 2F 7E E8   AB 01 6A 91 3A 5E 72 49  T.$../....j.:^rI
#     0040: 92 F1 B6 3B A9 02 F6 64   06 E5 12 BD 6B 76 31 EC  ...;...d....kv1.
#     0050: 26 A6 EF F9 AD 1D 1D A4   07 63 C3 03 83 EE 89 2C  &........c.....,
#     0060: ED 9E 65 BD C2 31 74 91   EB BE E3 E3 B3 F4 95 89  ..e..1t.........
#     0070: 85 2D 0E 67 58 E1 5A B8   5C CB 11 2F 02 D9 84 A1  .-.gX.Z.\../....
#     0080: A8 89 AD 69 2D 16 08 41   38 C3 24 F8 96 C5 64 D2  ...i-..A8.$...d.
#     0090: B9 EE 84 E4 C1 A2 78 0A   D1 0D 1D 65 4A 7C 30 73  ......x....eJ.0s
#     00A0: A6 E9 70 C8 14 02 E7 9C   5A 19 3B 57 3F 8F CE CA  ..p.....Z.;W?...
#     00B0: A1 CB 22 08 E7 09 5D B7   B4 06 4A 9F 5C D4 F4 A1  .."...]...J.\...
#     00C0: DC B8 2B 3D E3 CD FD 9C   E6 16 96 93 2A E8 CA 5C  ..+=........*..\
#     00D0: 82 CA F5 BD 9F E1 5C C7   D8 5B BD AF 63 AC 97 5E  ......\..[..c..^
#     00E0: 90 AD CF 7A C7 AB 2D 43   F0 BE 85 30 50 26 1B A1  ...z..-C...0P&..
#     00F0: 13 36 F4 B1 47 A9 9A C9   95 E8 6A E6 FE FC 4A 82  .6..G.....j...J.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.316 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B9 DD 8B A8 21 EF 46 BF   EE 03 FB 74 77 6C 82 D5  ....!.F....twl..
#     0010: 38 1C 32 E6 4D B1 EA 3B   48 79 3B 64 03 D8 1A 09  8.2.M..;Hy;d....
#     0020: F7 A8 AB A1 4A 50 8D 8C   53 29 43 47 79 91 9E 89  ....JP..S)CGy...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.420 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:21.518 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "3C CA 5B 43 AD 3D 19 B0 DE 81 69 AA A5 7A D0 02 91 D7 C4 84 16 10 11 BB 0E 9B 34 E1 0F 54 DD 4F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 01:39:22.344 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 01:39:22.345 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 01:39:24.048; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 01:39:24.055; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 01:39:24.441; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-A8Dbxh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-A8Dbxh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 01:39:24.443; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-A8Dbxh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-A8Dbxh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 01:39:24.444; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-A8Dbxh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-A8Dbxh/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 01:39:24.482 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 6A E9 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 01:39:05.000 UTC",
#     "not  after"         : "2024-01-24 01:39:05.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#         0010: 0B 09 82 B9                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 CB F9 E5 29 08 62 5B   FC F5 B0 B8 0D 39 B4 3C  a...).b[.....9.<
#         0010: D4 A4 55 C8                                        ..U.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 69 15 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 01:38:58.000 UTC",
#     "not  after"         : "2024-01-24 01:38:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 89 3D 23 87 F0 A5 12   E4 C1 FB 60 9D 4A AF 0E  ..=#.......`.J..
#         0010: EC 72 06 7F                                        .r..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#         0010: 0B 09 82 B9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 01:39:24.486 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 4C DF 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 01:38:56.000 UTC",
#     "not  after"         : "2024-01-24 01:38:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 89 3D 23 87 F0 A5 12   E4 C1 FB 60 9D 4A AF 0E  ..=#.......`.J..
#         0010: EC 72 06 7F                                        .r..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 69 15 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 01:38:58.000 UTC",
#     "not  after"         : "2024-01-24 01:38:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 89 3D 23 87 F0 A5 12   E4 C1 FB 60 9D 4A AF 0E  ..=#.......`.J..
#         0010: EC 72 06 7F                                        .r..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#         0010: 0B 09 82 B9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 01:39:24.501 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 01:39:24.667 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 01:39:24.667 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 01:39:24.667 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 01:39:24.667 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 01:39:24.734 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:24.735 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 01:39:24.736 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 01:39:24.736 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:24.741 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:24.752 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:24.752 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:24.752 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:24.754 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D4 FA 60 6E 15 2B D4 5F 65 97 67 5F C2 D4 AD 4E 91 55 F2 C6 0A 25 D6 71 3D 4D 32 0D 95 26 E7 F0",
#   "session id"          : "87 96 F3 38 AC 91 BA 68 B7 C8 EE D9 01 2E 9A C4 C2 F2 04 09 B9 39 31 C3 D9 E0 4E DD FD DC 1D 57",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 24 93 D4 B9 B9 AB F2 71   81 96 47 1C F6 79 D7 2A  $......q..G..y.*
#             0010: 18 2D AE 2D EC 7A 75 54   44 CC 27 36 6E 8F 33 62  .-.-.zuTD.'6n.3b
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.865 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D2 B0 AA D2 E2 95 81 94 01 BB CF C5 5A 30 14 59 86 AF 82 E3 C8 3A 4A 88 98 CB 5D AC 6A 6C 55 20",
#   "session id"          : "87 96 F3 38 AC 91 BA 68 B7 C8 EE D9 01 2E 9A C4 C2 F2 04 09 B9 39 31 C3 D9 E0 4E DD FD DC 1D 57",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B3 20 AB F7 46 D9 91 3E   34 3B 86 DE A0 BC D6 35  . ..F..>4;.....5
#           0010: 70 05 1D D8 31 B7 78 09   92 17 FB DB CA 05 6D 6E  p...1.x.......mn
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.865 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.866 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.868 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.869 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.870 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.874 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.875 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.875 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.875 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.875 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:24.875 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:24.875 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.875 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.876 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.895 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.896 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.897 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.903 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.903 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.903 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.904 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.904 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.904 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.904 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:24.904 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:24.904 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.909 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.909 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.909 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.910 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.910 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.911 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:24.911 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.920 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D EB 19 2B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 01:39:01.000 UTC",
#       "not  after"         : "2024-01-24 01:39:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#           0010: 0B 09 82 B9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8E 02 D4 24 3F 97 DC 40   BD 09 60 21 0D 93 E9 0E  ...$?..@..`!....
#           0010: CD 87 D3 A6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.920 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.973 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 69 15 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 01:38:58.000 UTC",
#     "not  after"         : "2024-01-24 01:38:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 89 3D 23 87 F0 A5 12   E4 C1 FB 60 9D 4A AF 0E  ..=#.......`.J..
#         0010: EC 72 06 7F                                        .r..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#         0010: 0B 09 82 B9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.976 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 13 1C A5 6B 10 A7 56 F2   EC 7C 36 6D 35 E3 C8 71  ...k..V...6m5..q
#     0010: E0 BD 93 45 67 99 DD B4   73 0A DE BD 64 13 F2 69  ...Eg...s...d..i
#     0020: 6E E6 F4 A9 CE CA BE FD   B7 C3 EF B1 E2 ED 3A 07  n.............:.
#     0030: 24 C4 83 B5 1A FC D1 34   39 A8 34 EE A9 71 65 B7  $......49.4..qe.
#     0040: 7A 61 72 C1 59 E1 6B D4   F4 34 20 52 38 3B A4 81  zar.Y.k..4 R8;..
#     0050: 4D 6A C2 AE 1C 1E 60 45   D2 69 36 05 A2 A9 5D 80  Mj....`E.i6...].
#     0060: 14 9F 74 6C 34 EF C1 D3   13 8D 6A 75 A2 DB C1 82  ..tl4.....ju....
#     0070: 3B D3 D1 F0 88 80 4F CE   B8 0B AF F1 72 95 4E 7A  ;.....O.....r.Nz
#     0080: 4E 83 EA 88 8C 09 62 61   9F 62 C9 2E B7 79 FF A9  N.....ba.b...y..
#     0090: 1F 3D E2 51 FB DF CE 29   6C 6C 0F 92 96 8C 88 B4  .=.Q...)ll......
#     00A0: 52 24 88 EA 36 33 0C ED   C0 4C 30 4B 82 FD 19 B2  R$..63...L0K....
#     00B0: AE CC 59 BD 4C 36 12 AB   6E 7C 2E D6 70 69 76 C5  ..Y.L6..n...piv.
#     00C0: DD 9E A9 15 73 5B 5C 62   26 40 D0 AA B2 68 08 8A  ....s[\b&@...h..
#     00D0: B2 75 B5 37 B0 F9 1E C9   2C 45 79 06 EA 39 B9 EF  .u.7....,Ey..9..
#     00E0: 30 A5 D8 44 5A C0 E2 AC   13 C4 68 8C 2D 3D 7A 0D  0..DZ.....h.-=z.
#     00F0: 11 3B BF A6 D7 51 CC 9B   32 DB BE DD 8C 72 62 63  .;...Q..2....rbc
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.978 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7C 55 6F A8 34 BD 81 43   AD 3A 6E 12 C5 EA A4 60  .Uo.4..C.:n....`
#     0010: 22 B8 AD 94 11 C3 26 07   EB 47 C6 00 1B EE 24 C6  ".....&..G....$.
#     0020: 51 03 33 68 1C 43 84 BC   F5 BB 66 5D AD C1 44 39  Q.3h.C....f]..D9
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.980 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 01:39:24.981 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:24.981 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 01:39:24.981 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:24.981 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 01:39:24.981 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:24.981 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.982 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:24.983 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 6A E9 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 01:39:05.000 UTC",
#       "not  after"         : "2024-01-24 01:39:05.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#           0010: 0B 09 82 B9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 61 CB F9 E5 29 08 62 5B   FC F5 B0 B8 0D 39 B4 3C  a...).b[.....9.<
#           0010: D4 A4 55 C8                                        ..U.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1D 69 15 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 01:38:58.000 UTC",
#       "not  after"         : "2024-01-24 01:38:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 89 3D 23 87 F0 A5 12   E4 C1 FB 60 9D 4A AF 0E  ..=#.......`.J..
#           0010: EC 72 06 7F                                        .r..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#           0010: 0B 09 82 B9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:25.210 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 94 A9 F7 6C 5A 10 FE CC   2C 12 35 FA A5 98 D1 25  ...lZ...,.5....%
#     0010: A6 05 81 49 A4 FD 86 FC   93 FC 78 61 83 2F A9 BA  ...I......xa./..
#     0020: 99 76 76 87 A5 99 78 1A   40 5D 91 99 86 6C D0 FC  .vv...x.@]...l..
#     0030: 5B 09 E6 43 4F 5C C1 BE   34 E8 0E 03 A3 92 69 63  [..CO\..4.....ic
#     0040: 02 BC 85 69 30 59 43 47   E7 D8 0F F9 0E 6D 74 81  ...i0YCG.....mt.
#     0050: B2 14 80 CB 57 BE FB 7C   55 46 89 7D 64 B3 8F 0B  ....W...UF..d...
#     0060: 8B 53 6B 07 41 30 FE 7C   F5 D0 15 47 38 BD 52 87  .Sk.A0.....G8.R.
#     0070: A0 9A FB EE 3A B8 3A 83   F1 50 52 94 51 75 77 8D  ....:.:..PR.Quw.
#     0080: F5 4F C3 72 26 3E 10 99   B0 0B 94 D0 33 C9 72 26  .O.r&>......3.r&
#     0090: 41 FF 12 08 84 06 62 CB   FE 2E BB 53 0A DA 4B 22  A.....b....S..K"
#     00A0: 21 3F 39 03 AE D2 28 8B   0F 43 A0 8D 8D D7 82 87  !?9...(..C......
#     00B0: E9 0A 7D ED 5D 99 AF 9F   DC 66 B2 33 EA 7C 53 36  ....]....f.3..S6
#     00C0: 63 51 E6 48 ED D0 EA 26   C3 06 F2 6E 25 8D 2D 5C  cQ.H...&...n%.-\
#     00D0: 2E 47 80 E7 0A E6 EE 6C   80 CC DE D4 89 54 38 B4  .G.....l.....T8.
#     00E0: 72 C6 98 74 63 19 20 4D   ED 83 3E C8 42 07 5E 19  r..tc. M..>.B.^.
#     00F0: 56 44 6B FC 02 BB F7 26   2D FF 57 E4 22 E5 F9 C3  VDk....&-.W."...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:25.211 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 88 EC B8 0B FE 28 4D 7F   53 05 A3 94 16 C0 79 A5  .....(M.S.....y.
#     0010: 5A E1 8F 80 C8 99 22 B7   E4 89 A1 48 4D 00 30 10  Z....."....HM.0.
#     0020: 76 FE 5E CB 76 CF 73 10   FC 6C 02 9C 8B BD 10 D0  v.^.v.s..l......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:25.211 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:25.267 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DA 0F 37 FC 10 C2 EE 30 FD 37 35 4D 28 6F 26 54 FE E5 E7 99 60 D3 C6 65 6E 74 89 EA 86 BB 12 34",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 01:39:25.566 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 01:39:25.566 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-26 01:39:38.734; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 01:39:39.072 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 4C DF 42",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 01:38:56.000 UTC",
#       "not  after"         : "2024-01-24 01:38:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 89 3D 23 87 F0 A5 12   E4 C1 FB 60 9D 4A AF 0E  ..=#.......`.J..
#           0010: EC 72 06 7F                                        .r..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1D 69 15 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 01:38:58.000 UTC",
#       "not  after"         : "2024-01-24 01:38:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 89 3D 23 87 F0 A5 12   E4 C1 FB 60 9D 4A AF 0E  ..=#.......`.J..
#           0010: EC 72 06 7F                                        .r..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 B4 25 CF 0A A7 DF DA   77 0F D2 76 9B 7E 51 A3  ..%.....w..v..Q.
#           0010: 0B 09 82 B9                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 01:39:39.086 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 01:39:39.245 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:39.245 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 01:39:39.247 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 01:39:39.247 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:39.252 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:39.263 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:39.263 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:39.263 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 01:39:39.265 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "61 0E 36 1C 41 29 24 86 40 8F FA DF FC 62 B0 A0 89 81 62 03 89 3E 82 AC 8E 0A 4B 38 72 A4 86 99",
#     "session id"          : "29 85 63 99 9C 70 08 03 D3 C7 EC C3 E6 8D 0C 21 86 E0 46 24 66 3A 79 3C ED 08 C3 FD 42 EE F1 21",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 56 E1 71 5A B6 ED BC BF   1E 0E 0E 4B 09 6B BC D2  V.qZ.......K.k..
#               0010: 1A F7 94 97 61 82 97 35   B8 21 BF C7 01 06 CD 30  ....a..5.!.....0
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.297 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "5A 41 FB 66 08 D1 5D F0 38 6A EC 51 84 03 CA 21 A9 57 EA 49 B2 30 39 3F 87 6E D0 74 FA E4 59 D7",
#     "session id"          : "29 85 63 99 9C 70 08 03 D3 C7 EC C3 E6 8D 0C 21 86 E0 46 24 66 3A 79 3C ED 08 C3 FD 42 EE F1 21",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 78 71 26 54 DF 76 26 B7   33 F0 1D 29 40 C7 4E 02  xq&T.v&.3..)@.N.
#             0010: 0A B4 F1 D3 FA 32 71 59   5B 15 DC CF 15 29 F2 77  .....2qY[....).w
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.298 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.298 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.299 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.299 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.299 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.299 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.299 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.300 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.300 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.300 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.301 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.302 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.302 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.302 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.302 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.302 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.302 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.302 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.302 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.302 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:39.302 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:39.303 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.314 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.315 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.317 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.321 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.321 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.321 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.321 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.322 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.322 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.322 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:39.322 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:39.322 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.323 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.323 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.324 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.327 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.329 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.329 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:39:39.329 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 01:39:39.337 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificat

[...truncated too long message...]

ity.AccessController.doPrivileged(Native Method)
#   	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 01:40:55.314 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33088/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14380ms
ok 65 stop command for single port in 17694ms
ok 66 status detects locally running solr in 7720ms
ok 67 status does not expose cli parameters to end user in 251ms
ok 68 listing out files in 3000ms
ok 69 copying files around in 6626ms
ok 70 upconfig in 2641ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1261ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1249ms
ok 73 Cleanup in 1286ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 54s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/o2juxfbjohu6o

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 885 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/885/

All tests passed

Build Log:
[...truncated 1227 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44997/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-25 23:14:02.642; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 23:14:02.646; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-25 23:14:03.493; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 23:14:03.534; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 16683ms
ok 61 start solr with client truststore and security manager in 20098ms
not ok 62 start solr with mTLS needed in 51852ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-MF8kUS/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 44997 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44997 (pid=572489). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 44998 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]
# Started Solr server on port 44998 (pid=572600). Happy searching!
#
#     INFO  - 2023-10-25 23:15:06.146; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 23:15:06.152; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 23:15:06.793; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@c7a975a(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-MF8kUS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MF8kUS/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 23:15:06.807; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-MF8kUS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MF8kUS/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 23:15:06.814; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(ca,h=[localhost],a=[],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-MF8kUS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MF8kUS/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 23:15:07.021 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 7A 98 B9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 23:14:52.000 UTC",
#     "not  after"         : "2024-01-23 23:14:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#         0010: B3 EB A5 36                                        ...6
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 8D E5 47 81 E0 D8 CC   9A BE 9F 44 A3 80 51 F3  #..G.......D..Q.
#         0010: A3 2E F9 E8                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 EF 1D 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 23:14:45.000 UTC",
#     "not  after"         : "2024-01-23 23:14:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 1A 53 E8 EB 2F 1C D5   4C 0C C0 00 59 1D 4D CB  ..S../..L...Y.M.
#         0010: 90 65 C6 2D                                        .e.-
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#         0010: B3 EB A5 36                                        ...6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 23:15:07.032 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 EF 1D 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 23:14:45.000 UTC",
#     "not  after"         : "2024-01-23 23:14:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 1A 53 E8 EB 2F 1C D5   4C 0C C0 00 59 1D 4D CB  ..S../..L...Y.M.
#         0010: 90 65 C6 2D                                        .e.-
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#         0010: B3 EB A5 36                                        ...6
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 04 B6 08",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 23:14:43.000 UTC",
#     "not  after"         : "2024-01-23 23:14:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 1A 53 E8 EB 2F 1C D5   4C 0C C0 00 59 1D 4D CB  ..S../..L...Y.M.
#         0010: 90 65 C6 2D                                        .e.-
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 23:15:07.077 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 23:15:07.658 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:07.658 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 23:15:07.662 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 23:15:07.663 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:07.675 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:07.807 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:07.808 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:07.808 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:07.810 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "56 68 82 F4 7F 7E A8 72 4A F8 33 9D F0 C6 0F F5 25 BF C1 DB C7 AB 55 FF 7B FF 42 E2 00 C4 DF 20",
#   "session id"          : "E6 70 51 06 63 D0 CE 0C C4 CF D1 3D D4 15 8C C8 91 C0 6C 98 EA 16 C4 07 B5 39 C5 79 C7 AB A8 C2",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F2 88 C7 90 B3 03 A8 66   61 15 26 ED C2 94 8A D7  .......fa.&.....
#             0010: 79 79 08 58 35 89 30 27   1C 46 FB 8B 36 41 72 6B  yy.X5.0'.F..6Ark
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.955 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "98 19 FD 39 43 7E 09 86 90 47 A2 ED 95 18 2A 39 67 12 BE F3 A8 87 1B 6C 52 A1 5B 54 70 60 E3 4D",
#   "session id"          : "E6 70 51 06 63 D0 CE 0C C4 CF D1 3D D4 15 8C C8 91 C0 6C 98 EA 16 C4 07 B5 39 C5 79 C7 AB A8 C2",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F3 99 C3 99 28 D4 D7 8E   B5 0C 23 63 92 14 84 CE  ....(.....#c....
#           0010: E7 4E 72 E4 90 81 67 FE   43 35 F5 E2 DD 04 1A 3F  .Nr...g.C5.....?
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.955 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.956 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.963 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.963 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.967 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.978 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.980 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.980 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.980 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.980 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.984 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.984 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.985 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.985 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:07.985 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:07.985 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.985 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:07.985 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.017 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.019 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.020 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.046 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.046 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.047 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.047 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.047 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.047 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.047 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:08.047 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:08.047 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.049 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.049 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.049 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.049 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.050 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.050 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:08.050 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.061 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 87 EA 33",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 23:14:48.000 UTC",
#       "not  after"         : "2024-01-23 23:14:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#           0010: B3 EB A5 36                                        ...6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 50 1D 9B 54 5D 63 17   17 C7 9E 4A 9E 1D 9C D4  .P..T]c....J....
#           0010: BB 7D E3 06                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.062 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 23:15:08.357 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 23:15:08.357 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 23:15:08.358 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 23:15:08.358 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.362 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 EF 1D 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 23:14:45.000 UTC",
#     "not  after"         : "2024-01-23 23:14:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 1A 53 E8 EB 2F 1C D5   4C 0C C0 00 59 1D 4D CB  ..S../..L...Y.M.
#         0010: 90 65 C6 2D                                        .e.-
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#         0010: B3 EB A5 36                                        ...6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.365 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 67 5C 0A C1 41 C9 4D 67   75 1D 60 87 BC E6 DB 36  g\..A.Mgu.`....6
#     0010: 48 A6 F3 15 82 5D EA EC   34 AB 02 DE 0D 10 D7 E0  H....]..4.......
#     0020: FF A1 AF 55 F4 A6 E9 90   F9 E9 E4 7E 8F CC 2B 3D  ...U..........+=
#     0030: 6E B9 5E 29 DA 40 F5 C2   93 DE 7C 81 2C D3 9C 69  n.^).@......,..i
#     0040: D7 0A 92 1B 97 A9 36 98   1E 6A 36 C4 65 2E 12 89  ......6..j6.e...
#     0050: 86 69 48 7C 13 FF B6 8A   A4 47 28 AC 4F 78 8F 71  .iH......G(.Ox.q
#     0060: 8D 2A 76 01 31 2D D7 C3   7B A2 CA AE CB FC B5 0E  .*v.1-..........
#     0070: 8F F5 02 95 45 1D F7 6D   33 0E D8 E1 50 7B AA 5C  ....E..m3...P..\
#     0080: B7 78 24 C5 8B 02 78 01   AF 6D 1F 6C EF 57 1A E2  .x$...x..m.l.W..
#     0090: C8 FC 14 D7 1E FF 95 43   96 A6 58 7C 55 6A 95 3F  .......C..X.Uj.?
#     00A0: 04 45 A7 B9 DB CB 8C 0F   91 1F 21 92 E6 E5 52 8B  .E........!...R.
#     00B0: B9 84 53 69 B1 B8 04 30   B8 65 83 03 70 49 4F A4  ..Si...0.e..pIO.
#     00C0: 6D 9B 11 D4 2B 2E D7 26   8D 58 80 A4 D7 1B 5D BA  m...+..&.X....].
#     00D0: 54 2B 88 CD EE 91 41 58   91 26 BB B9 47 B3 34 B3  T+....AX.&..G.4.
#     00E0: 7C D0 AC 6A 0D 7D 17 EC   65 20 B8 EB CA EB 4F A4  ...j....e ....O.
#     00F0: DA 3D A0 E4 64 F0 3C E0   A2 C4 7A A8 D9 F4 21 AF  .=..d.<...z...!.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.367 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 36 A4 1A 0C 25 C2 6E A8   4D 92 E3 CA 1E 5A D3 37  6...%.n.M....Z.7
#     0010: 62 30 25 8F 80 8A DC ED   42 9B 91 EC 47 B5 07 BB  b0%.....B...G...
#     0020: CE 43 AD 92 18 6C FB 3A   6A B4 4B 2C E6 77 27 4E  .C...l.:j.K,.w'N
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.377 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 23:15:08.378 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:08.378 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 23:15:08.381 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:08.381 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 23:15:08.381 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:08.381 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.381 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.384 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 7A 98 B9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 23:14:52.000 UTC",
#       "not  after"         : "2024-01-23 23:14:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#           0010: B3 EB A5 36                                        ...6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 8D E5 47 81 E0 D8 CC   9A BE 9F 44 A3 80 51 F3  #..G.......D..Q.
#           0010: A3 2E F9 E8                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 EF 1D 48",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 23:14:45.000 UTC",
#       "not  after"         : "2024-01-23 23:14:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 1A 53 E8 EB 2F 1C D5   4C 0C C0 00 59 1D 4D CB  ..S../..L...Y.M.
#           0010: 90 65 C6 2D                                        .e.-
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#           0010: B3 EB A5 36                                        ...6
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.458 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 35 90 16 D1 F7 9D 24 C7   D1 72 2E 61 25 99 1E 19  5.....$..r.a%...
#     0010: 30 5D 7C FD 72 F3 5B 04   7A 2E 2E 9A 8D 09 4F F7  0]..r.[.z.....O.
#     0020: C1 3F BD 67 41 B6 09 9B   B7 21 45 75 1C 87 A9 94  .?.gA....!Eu....
#     0030: 17 A8 06 6C 09 58 E5 F3   48 B4 D9 D6 D5 2D 45 ED  ...l.X..H....-E.
#     0040: 9F 11 A7 A9 13 9C 19 53   C7 AA 43 B4 70 9A 38 D9  .......S..C.p.8.
#     0050: 01 4D 67 74 89 FB BC 07   34 C8 28 BC B6 8A 8B 25  .Mgt....4.(....%
#     0060: 1F 14 33 CD C5 76 E2 5A   8B 65 D5 46 34 95 3F C2  ..3..v.Z.e.F4.?.
#     0070: 31 73 97 47 8F 7E D4 B9   5E 68 A0 3C AF E0 5F 84  1s.G....^h.<.._.
#     0080: F9 82 D8 64 A0 3F 5E 70   85 BB 13 4B E2 34 2F CF  ...d.?^p...K.4/.
#     0090: 91 1D 09 74 21 9A B6 87   20 F1 46 C6 0C 53 DE 8F  ...t!... .F..S..
#     00A0: 3A F8 D6 DC 97 B9 DC 80   E5 39 5A A6 59 FC 68 F0  :........9Z.Y.h.
#     00B0: FA 1B C9 AE B0 6A FC FD   A3 6D F2 84 99 7E 5B 8C  .....j...m....[.
#     00C0: 7A 0F 5F 17 FB 4E 3E 86   19 7D 77 AA BE BA 41 FF  z._..N>...w...A.
#     00D0: E0 19 F4 80 54 EE E5 60   99 76 F5 2A DF C1 9C 3A  ....T..`.v.*...:
#     00E0: 59 48 DB 96 C3 8D 40 A7   94 F1 70 7C C4 01 75 98  YH....@...p...u.
#     00F0: E1 99 69 A2 07 1E 77 E0   86 EE 05 7B 9C C3 1D 18  ..i...w.........
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.460 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F5 0E FB 3F 4C 97 EA C4   F7 24 15 E0 54 EF B6 62  ...?L....$..T..b
#     0010: 72 68 64 D7 BF A5 B9 18   A2 3F 2C 94 1B B5 36 5D  rhd......?,...6]
#     0020: 75 19 64 E9 82 9E A5 D2   EE 31 E3 1A 33 29 B2 94  u.d......1..3)..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.467 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:08.591 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B4 F4 B3 D9 CD 68 51 40 A7 58 BC 97 1A C2 97 73 21 ED 46 59 37 59 65 88 C1 D7 EF 73 B3 7F 28 24",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 23:15:09.442 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 23:15:09.442 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-25 23:15:10.634; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 23:15:10.640; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 23:15:11.007; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-MF8kUS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MF8kUS/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 23:15:11.009; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-MF8kUS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MF8kUS/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 23:15:11.010; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-MF8kUS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MF8kUS/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 23:15:11.041 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 7A 98 B9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 23:14:52.000 UTC",
#     "not  after"         : "2024-01-23 23:14:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#         0010: B3 EB A5 36                                        ...6
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 8D E5 47 81 E0 D8 CC   9A BE 9F 44 A3 80 51 F3  #..G.......D..Q.
#         0010: A3 2E F9 E8                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 EF 1D 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 23:14:45.000 UTC",
#     "not  after"         : "2024-01-23 23:14:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 1A 53 E8 EB 2F 1C D5   4C 0C C0 00 59 1D 4D CB  ..S../..L...Y.M.
#         0010: 90 65 C6 2D                                        .e.-
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#         0010: B3 EB A5 36                                        ...6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 23:15:11.045 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 EF 1D 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 23:14:45.000 UTC",
#     "not  after"         : "2024-01-23 23:14:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 1A 53 E8 EB 2F 1C D5   4C 0C C0 00 59 1D 4D CB  ..S../..L...Y.M.
#         0010: 90 65 C6 2D                                        .e.-
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#         0010: B3 EB A5 36                                        ...6
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 04 B6 08",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 23:14:43.000 UTC",
#     "not  after"         : "2024-01-23 23:14:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 1A 53 E8 EB 2F 1C D5   4C 0C C0 00 59 1D 4D CB  ..S../..L...Y.M.
#         0010: 90 65 C6 2D                                        .e.-
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 23:15:11.057 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 23:15:11.268 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:11.268 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 23:15:11.270 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 23:15:11.270 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:11.275 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:11.285 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:11.285 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:11.286 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:11.288 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A1 C2 40 BC 85 63 23 2E AD 06 03 DB 77 9B 72 1C E0 EF FC 07 D4 0F 22 5D C0 1B 39 3E 65 E7 FA 0F",
#   "session id"          : "A4 99 BA 91 C7 FB E5 E1 D9 1A 94 0F 08 74 6E 93 89 44 70 BC 3D 3B 4D 78 19 C9 B3 BF F7 AA 42 67",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 28 08 A6 90 11 DE E4 12   0E A4 DE CD F6 EE D8 06  (...............
#             0010: AF CB BA 63 B8 85 E1 08   D4 14 AA 69 7C 67 A7 59  ...c.......i.g.Y
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.395 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A5 02 F9 7A D1 94 84 33 CD 06 6B DE A0 6F 90 7D F1 82 8C 91 61 91 8F A3 26 A4 FC 74 A9 A7 7A 7B",
#   "session id"          : "A4 99 BA 91 C7 FB E5 E1 D9 1A 94 0F 08 74 6E 93 89 44 70 BC 3D 3B 4D 78 19 C9 B3 BF F7 AA 42 67",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 74 4B 12 4C 2F 2D 72 D9   C7 0D 98 C6 F4 22 FB 32  tK.L/-r......".2
#           0010: 0A 0B 1D F6 9C E7 5A 6E   B6 60 48 68 07 E3 ED 45  ......Zn.`Hh...E
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.395 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.395 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.396 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.398 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.398 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.398 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.399 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.399 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.399 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.399 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.399 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.399 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.399 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:11.399 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:11.400 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.423 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.424 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.432 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.435 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.436 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.436 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.436 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.436 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.436 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.436 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:11.436 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:11.436 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.439 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.439 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.439 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.440 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.440 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.441 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:11.441 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.448 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 87 EA 33",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 23:14:48.000 UTC",
#       "not  after"         : "2024-01-23 23:14:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#           0010: B3 EB A5 36                                        ...6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 50 1D 9B 54 5D 63 17   17 C7 9E 4A 9E 1D 9C D4  .P..T]c....J....
#           0010: BB 7D E3 06                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.448 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 23:15:11.520 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 23:15:11.520 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 23:15:11.520 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 23:15:11.520 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.544 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 EF 1D 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 23:14:45.000 UTC",
#     "not  after"         : "2024-01-23 23:14:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 1A 53 E8 EB 2F 1C D5   4C 0C C0 00 59 1D 4D CB  ..S../..L...Y.M.
#         0010: 90 65 C6 2D                                        .e.-
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#         0010: B3 EB A5 36                                        ...6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.749 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4D B3 04 8B 40 AF F3 D6   BD 0F 46 23 07 9F ED 3D  M...@.....F#...=
#     0010: 68 FD 48 B3 BF 85 AA 5B   EC 90 6F 25 06 6D 4E 0B  h.H....[..o%.mN.
#     0020: 25 CA 58 3B 69 F3 34 3B   53 02 CC E3 C1 17 24 7B  %.X;i.4;S.....$.
#     0030: 45 E4 24 B5 34 23 36 6D   04 57 0B F5 ED 11 D3 85  E.$.4#6m.W......
#     0040: 19 3F 0B F2 3A 0C C6 A5   6F 6C 3B 0F 68 28 11 6D  .?..:...ol;.h(.m
#     0050: D2 FF 22 6B 1D C2 67 D6   4D 9D E5 5D EE 46 2B 4F  .."k..g.M..].F+O
#     0060: 63 8B 8A A6 E1 14 85 D5   6D A3 98 E3 A5 AE 6A CD  c.......m.....j.
#     0070: 3B AA 05 08 DC D5 06 8E   19 D2 E1 8F A4 9E 3E B9  ;.............>.
#     0080: 2D 18 AE 86 FC 2D E6 3B   46 E4 C1 FB 9B 6E DB 3C  -....-.;F....n.<
#     0090: 68 3B 55 F0 ED 4A C4 EB   FC 0A B0 A5 41 35 06 1B  h;U..J......A5..
#     00A0: D4 58 23 D9 25 BC F7 6B   F1 41 47 8A 8E 36 60 C3  .X#.%..k.AG..6`.
#     00B0: CD B9 47 AB 3B 72 54 5F   E8 8F BF B3 80 EC 78 07  ..G.;rT_......x.
#     00C0: A8 9F F7 3B 17 EE DE 17   0F 12 33 76 91 69 B7 B3  ...;......3v.i..
#     00D0: EE 08 1C C2 D2 6D A7 73   69 A2 1A 13 47 3C BA F7  .....m.si...G<..
#     00E0: 68 C3 5D 49 A0 93 34 CC   AE 5B BC 78 F0 E2 16 5D  h.]I..4..[.x...]
#     00F0: D0 49 DC 9E 32 C6 7A AB   95 67 BA FA A6 EE 41 C0  .I..2.z..g....A.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.751 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A4 04 B6 C2 41 4E A9 96   56 73 04 CB C2 D7 0F 95  ....AN..Vs......
#     0010: BC 17 50 6B 45 69 3F 8C   5D 6E 4D 81 8C DA 7B 3A  ..PkEi?.]nM....:
#     0020: A8 65 3D 25 C3 75 1A 7F   A7 47 F8 35 58 F0 A7 14  .e=%.u...G.5X...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.754 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 23:15:11.755 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:11.756 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 23:15:11.756 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:11.756 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 23:15:11.756 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:11.756 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.756 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.758 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 7A 98 B9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 23:14:52.000 UTC",
#       "not  after"         : "2024-01-23 23:14:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#           0010: B3 EB A5 36                                        ...6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 8D E5 47 81 E0 D8 CC   9A BE 9F 44 A3 80 51 F3  #..G.......D..Q.
#           0010: A3 2E F9 E8                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 EF 1D 48",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 23:14:45.000 UTC",
#       "not  after"         : "2024-01-23 23:14:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 1A 53 E8 EB 2F 1C D5   4C 0C C0 00 59 1D 4D CB  ..S../..L...Y.M.
#           0010: 90 65 C6 2D                                        .e.-
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#           0010: B3 EB A5 36                                        ...6
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.782 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 68 93 6A 50 8C B4 6A B0   BE 78 60 D4 36 FE 99 9B  h.jP..j..x`.6...
#     0010: F4 BA BE F1 42 95 5E B2   AB C4 F5 A9 1E 51 54 55  ....B.^......QTU
#     0020: B5 20 D7 9A C1 93 63 62   65 65 DC 81 DD C3 A6 57  . ....cbee.....W
#     0030: 99 2D 34 B5 10 DA DC 05   77 1D DE E8 9A 5D 91 60  .-4.....w....].`
#     0040: EE 31 1D 49 C1 F5 D3 B1   25 F5 33 8A D7 74 2C FD  .1.I....%.3..t,.
#     0050: 98 99 76 E7 7D 24 46 FB   5F 07 2C 3E 88 66 13 46  ..v..$F._.,>.f.F
#     0060: 93 C7 5D 6D 88 56 5E 5A   5C B0 E4 E7 A0 D0 19 CD  ..]m.V^Z\.......
#     0070: B6 B7 01 3A 5C E2 A1 2D   32 7E 38 11 F8 87 44 1E  ...:\..-2.8...D.
#     0080: 92 E8 D4 4A 0B E5 1E 1F   5B F1 CA 55 84 41 D4 15  ...J....[..U.A..
#     0090: 42 68 1A 66 90 6F A0 E4   43 56 82 4D 10 35 DA EE  Bh.f.o..CV.M.5..
#     00A0: A6 2C 39 6C E4 0E D5 71   46 19 6D BE 11 97 12 02  .,9l...qF.m.....
#     00B0: EE DC 38 D3 A9 1D AB 47   25 28 3C 9B A6 DD A5 96  ..8....G%(<.....
#     00C0: 14 20 89 70 06 95 4E 77   34 AD FF 71 BA 6A 2A 8B  . .p..Nw4..q.j*.
#     00D0: EF 3B 4D 3F 0C 88 E6 05   F2 2E F5 2C 01 1D 29 6F  .;M?.......,..)o
#     00E0: 99 1B B0 AB 94 42 89 79   B9 EF F6 08 63 05 2F F0  .....B.y....c./.
#     00F0: 41 83 3E E2 96 1F 22 44   74 F7 F4 58 A0 3D 40 28  A.>..."Dt..X.=@(
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.783 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4A FA 76 2E 09 E9 28 B8   BC 8E B0 DB BB 30 F1 E4  J.v...(......0..
#     0010: 31 97 E8 C7 B8 83 D9 6F   E1 E0 E7 8D 36 C3 63 9A  1......o....6.c.
#     0020: C9 50 CC AC 04 4F DB 3D   7F A9 59 CE 83 89 B4 FD  .P...O.=..Y.....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.784 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:11.846 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "EB 51 38 35 52 2E 09 2A 67 B1 F0 6D 78 1B 8C 8D F1 59 F5 18 CD F9 C4 56 88 5A BC 70 D1 EA D0 1C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 23:15:12.098 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 23:15:12.099 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-25 23:15:25.869; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-25 23:15:26.218 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 EF 1D 48",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 23:14:45.000 UTC",
#       "not  after"         : "2024-01-23 23:14:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 1A 53 E8 EB 2F 1C D5   4C 0C C0 00 59 1D 4D CB  ..S../..L...Y.M.
#           0010: 90 65 C6 2D                                        .e.-
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 B4 4E DE 1D 62 A0 6F   FC AF B8 6D A4 A1 14 91  ..N..b.o...m....
#           0010: B3 EB A5 36                                        ...6
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 04 B6 08",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 23:14:43.000 UTC",
#       "not  after"         : "2024-01-23 23:14:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 1A 53 E8 EB 2F 1C D5   4C 0C C0 00 59 1D 4D CB  ..S../..L...Y.M.
#           0010: 90 65 C6 2D                                        .e.-
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-25 23:15:26.231 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 23:15:26.391 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:26.391 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 23:15:26.393 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 23:15:26.393 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:26.397 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:26.408 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:26.408 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:26.408 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 23:15:26.410 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "D7 BF 83 26 B6 D5 C1 4E DD 30 4B CF F7 AF 2D 9A 6A 72 F0 1B 3B 6D E7 51 5D 85 ED 6C BF 53 E6 FF",
#     "session id"          : "7F 5A 98 63 47 03 81 0B 90 A2 CE 8B F6 1D A3 D6 43 19 10 FE 3D 49 75 95 C0 B4 69 F5 62 81 9A A8",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 16 F1 A2 77 E2 98 E2 A0   17 40 9D 77 03 AA 50 70  ...w.....@.w..Pp
#               0010: F0 D1 AD 23 20 05 6B BA   BC A3 DA DB 2C FD 8A 04  ...# .k.....,...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.428 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "29 51 8D B7 EB 24 5C 37 DA DE C5 FB 82 36 8A 5F 45 42 3B 17 DA 4D D1 D6 62 11 4D 5F CF BD 8A 15",
#     "session id"          : "7F 5A 98 63 47 03 81 0B 90 A2 CE 8B F6 1D A3 D6 43 19 10 FE 3D 49 75 95 C0 B4 69 F5 62 81 9A A8",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: FB 15 11 13 88 CD D0 9F   14 8F E1 A0 03 5F 60 88  ............._`.
#             0010: 4A D2 B2 09 89 00 9E DC   A1 4B 6D 2F 8A F4 F6 1E  J........Km/....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.428 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.429 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.431 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.431 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.431 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.437 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.437 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.437 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:26.438 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:26.438 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.446 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.449 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.450 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.458 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.458 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.458 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.458 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.458 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.458 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.458 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:26.458 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:26.459 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.461 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.461 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.461 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.462 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.462 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.463 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:15:26.463 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 23:15:26.470 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     

[...truncated too long message...]

ity.AccessController.doPrivileged(Native Method)
#   	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 23:16:39.556 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44998/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14828ms
ok 65 stop command for single port in 17385ms
ok 66 status detects locally running solr in 7806ms
ok 67 status does not expose cli parameters to end user in 244ms
ok 68 listing out files in 2999ms
ok 69 copying files around in 6618ms
ok 70 upconfig in 2628ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1243ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1251ms
ok 73 Cleanup in 1255ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 5m 33s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/z6hmxxtdrywc4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 884 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/884/

All tests passed

Build Log:
[...truncated 1167 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196651ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 7853ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-25 18:36:47.373; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:36:51.835; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 2367ms
not ok 8 accept d option with builtin config in 2463ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-25 18:36:56.673; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:36:56.731; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2446ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-25 18:36:59.158; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:36:59.215; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2452ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-25 18:37:01.639; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:37:01.697; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2399ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-25 18:37:04.072; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:37:04.123; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 4605ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-25 18:37:06.453; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:37:08.718; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 3446ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-25 18:37:11.075; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:37:12.235; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3414ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-25 18:37:20.855; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:37:20.909; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2367ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-25 18:37:23.255; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:37:23.310; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2359ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-25 18:37:25.617; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:37:25.691; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2351ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-25 18:37:27.985; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:37:28.051; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 28209ms
ok 19 Check export command in 22778ms
ok 20 export fails on non cloud mode in 8941ms
not ok 21 using curl to extract a single pdf file in 9031ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 45877 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45877 (pid=28651). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-25 18:38:37.248; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:38:37.303; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 12054ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 45877 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45877 (pid=29121). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-25 18:38:46.026; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:38:49.385; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8342ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 45877 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45877 (pid=29548). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-25 18:38:57.710; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:38:57.769; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30721ms
ok 25 start help flag prints help in 171ms
ok 26 stop help flag prints help in 167ms
ok 27 restart help flag prints help in 177ms
ok 28 status help flag prints help in 56ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 172ms
ok 30 create help flag prints help in 164ms
ok 31 createcore help flag prints help in 170ms
ok 32 createcollection help flag prints help in 167ms
ok 33 delete help flag prints help in 165ms
ok 34 version help flag prints help in 55ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 172ms
ok 36 auth help flag prints help in 171ms
ok 37 assert help flag prints help in 945ms
ok 38 post help flag prints help in 954ms
not ok 39 SQL Module in 10588ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:45877/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-25 18:39:42.700; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:39:42.761; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:45877/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19207ms
not ok 41 icu collation in analysis-extras module in 11863ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-25 18:40:11.032; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:40:14.389; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1338ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 5770 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 5770 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10099ms
not ok 44 deploying and undeploying a collection level package in 196463ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 45877 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45877 (pid=1303). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 12653ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-25 18:43:52.873; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:43:52.922; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-25 18:43:53.964; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:43:55.124; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 14981ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-25 18:44:05.688; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:44:07.946; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-25 18:44:08.976; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:44:10.133; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3889ms
not ok 48 basic post with a type specified in 1351ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1280ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1289ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1245ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1337ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1370ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1357ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 55 post solr log into solr via script in 11119ms
ok 56 post solr log into solr via cli in 7209ms
ok 57 allowPaths - backup in 16473ms
ok 58 start solr with ssl in 18585ms
ok 59 use different hostname when not checking peer-name in 31654ms
not ok 60 start solr with ssl and auth in 10690ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 45877 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45877 (pid=10181). Happy searching!
#
#     INFO  - 2023-10-25 18:46:06.558; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 18:46:06.563; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-25 18:46:08.874; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 18:46:08.950; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13836ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-25 18:46:18.472; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-25 18:46:22.068; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-25 18:46:23.593; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 39926ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-y8uoKS/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 45877 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45877 (pid=11768). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 45878 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45878 (pid=11927). Happy searching!
#
#     INFO  - 2023-10-25 18:46:49.853; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 18:46:49.856; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 18:46:50.651; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-y8uoKS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-y8uoKS/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:46:50.653; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6175619b(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-y8uoKS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-y8uoKS/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:46:50.653; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2f058b8a(ca,h=[localhost],a=[],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-y8uoKS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-y8uoKS/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:46:50.735 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E 13 D7 CD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:46:35.000 UTC",
#     "not  after"         : "2024-01-23 18:46:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 2B DB A7 AB 24 31 94   7D 15 F6 D4 FD 26 B6 1E   +...$1......&..
#         0010: 93 BF AF AF                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 FD A8 DB AE 34 36 C0   F4 1D B2 8A 9E B7 F7 72  .....46........r
#         0010: 97 62 33 AB                                        .b3.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 C6 E7 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:46:28.000 UTC",
#     "not  after"         : "2024-01-23 18:46:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 6E 80 BF 08 80 03 81   46 EB 93 9D 2E EB 19 80  .n......F.......
#         0010: 1B 9E CC 46                                        ...F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 2B DB A7 AB 24 31 94   7D 15 F6 D4 FD 26 B6 1E   +...$1......&..
#         0010: 93 BF AF AF                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:46:50.744 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 D2 74 FD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:46:26.000 UTC",
#     "not  after"         : "2024-01-23 18:46:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 6E 80 BF 08 80 03 81   46 EB 93 9D 2E EB 19 80  .n......F.......
#         0010: 1B 9E CC 46                                        ...F
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 C6 E7 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:46:28.000 UTC",
#     "not  after"         : "2024-01-23 18:46:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 6E 80 BF 08 80 03 81   46 EB 93 9D 2E EB 19 80  .n......F.......
#         0010: 1B 9E CC 46                                        ...F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 2B DB A7 AB 24 31 94   7D 15 F6 D4 FD 26 B6 1E   +...$1......&..
#         0010: 93 BF AF AF                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:46:51.159 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:46:51.449 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:46:51.449 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:46:51.451 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:46:51.451 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:46:51.455 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:46:51.472 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:46:51.473 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:46:51.473 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:46:51.477 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5E C8 0C 93 A5 87 A1 8D C6 3D E2 57 AF A8 28 A6 D7 40 99 73 60 D2 2C 4E 8F 68 F7 2A 3B 65 74 E7",
#   "session id"          : "B5 20 59 1C 7C D7 A9 5A 0B AB A8 09 D6 3E 42 A4 DE F9 30 E9 D2 65 0C 6B 7C 96 CA AC C1 11 4C 26",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EF 26 B4 CC 36 A0 AB 9C   3E 18 17 5F 7E D1 80 98  .&..6...>.._....
#             0010: 46 E3 63 EF 0B 77 1C 24   F6 41 22 59 D1 79 5A 19  F.c..w.$.A"Y.yZ.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.622 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "47 89 0F BF 39 17 F1 BC 9A 2A 0D 93 37 D7 49 00 FA F8 49 C7 83 E7 E8 DE 58 B8 EA 2C 9F 31 88 AE",
#   "session id"          : "B5 20 59 1C 7C D7 A9 5A 0B AB A8 09 D6 3E 42 A4 DE F9 30 E9 D2 65 0C 6B 7C 96 CA AC C1 11 4C 26",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6F 5B 49 5C 3C F0 A6 60   22 43 13 D4 40 EA 74 DE  o[I\<..`"C..@.t.
#           0010: C8 53 40 81 61 48 12 82   A9 A7 F2 70 1D 28 6D 04  .S@.aH.....p.(m.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.623 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.623 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.625 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.625 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.626 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.626 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.626 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.626 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.627 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.631 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.637 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.638 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.639 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.639 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.639 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:46:51.641 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:46:51.641 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.642 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.642 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.654 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.655 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.659 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.665 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.665 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.665 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.665 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.665 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.665 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.665 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:46:51.665 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:46:51.665 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.671 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.671 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.671 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.675 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.677 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.679 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:46:51.679 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.691 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 44 70 E4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:46:31.000 UTC",
#       "not  after"         : "2024-01-23 18:46:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 2B DB A7 AB 24 31 94   7D 15 F6 D4 FD 26 B6 1E   +...$1......&..
#           0010: 93 BF AF AF                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 52 E2 EE F4 72 67 4B   EA 97 69 13 2C 41 42 AF  %R...rgK..i.,AB.
#           0010: FD 3E 65 8A                                        .>e.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:51.694 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:52.236 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 C6 E7 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:46:28.000 UTC",
#     "not  after"         : "2024-01-23 18:46:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 6E 80 BF 08 80 03 81   46 EB 93 9D 2E EB 19 80  .n......F.......
#         0010: 1B 9E CC 46                                        ...F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 2B DB A7 AB 24 31 94   7D 15 F6 D4 FD 26 B6 1E   +...$1......&..
#         0010: 93 BF AF AF                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:52.244 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 07 50 84 79 36 30 F3   A7 6F 09 79 99 F3 E3 17  Q.P.y60..o.y....
#     0010: 05 19 FB 1E 0A 28 BF 71   82 F4 3A 76 0E FC A4 D9  .....(.q..:v....
#     0020: A0 00 44 37 EB 17 21 04   4D 45 A4 60 21 6E 2C E9  ..D7..!.ME.`!n,.
#     0030: 78 9D 32 4A 56 29 D2 FC   87 B0 62 B4 18 5C 13 2F  x.2JV)....b..\./
#     0040: 3E A1 E1 72 77 34 D3 F1   34 7C 3A 26 6B 7D F1 27  >..rw4..4.:&k..'
#     0050: 65 00 03 F4 50 DE 78 22   0E CF 9F E7 45 3E 6B 2B  e...P.x"....E>k+
#     0060: 03 AF 29 D8 C0 27 02 4C   02 83 52 58 C9 00 66 FF  ..)..'.L..RX..f.
#     0070: 2A 46 0E 30 A6 86 77 56   F3 05 CD 25 96 52 1F B4  *F.0..wV...%.R..
#     0080: EB D5 08 CA C5 51 9D F6   01 55 FF 5A F7 08 C9 64  .....Q...U.Z...d
#     0090: BF F2 90 9F B8 C9 AC 63   9C DB 9E 44 47 58 7C 25  .......c...DGX.%
#     00A0: 28 A6 D4 6E 4A 7D A9 F9   73 53 91 1F 60 DE A6 9C  (..nJ...sS..`...
#     00B0: 7B 01 FB 36 7F C5 98 7A   98 5F B1 D7 C9 86 B7 D1  ...6...z._......
#     00C0: 55 91 EE 5A D6 18 6A 0C   70 F7 4A 4C 32 96 30 D7  U..Z..j.p.JL2.0.
#     00D0: 94 3B 0C C5 CE EC DD 75   92 EF CD 14 D1 EB 84 10  .;.....u........
#     00E0: 54 77 99 88 EF 49 29 96   4E BF 73 DE A4 E1 32 D0  Tw...I).N.s...2.
#     00F0: F9 59 8E C9 3E 7B 54 C4   A3 57 CE 13 3E 66 8E 36  .Y..>.T..W..>f.6
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:52.246 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A7 74 A0 F6 D6 6A 98 2C   FC 4E 92 34 DB 17 62 92  .t...j.,.N.4..b.
#     0010: 4D 53 68 FE BF 9E 29 A8   2D 24 9A BA FF 56 08 08  MSh...).-$...V..
#     0020: 73 7E A1 A1 D1 CA 1B 0D   53 D5 2B 0F 76 9A B6 F3  s.......S.+.v...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:52.252 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:46:52.253 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:46:52.254 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:46:52.254 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:46:52.254 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:46:52.254 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:46:52.254 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:52.254 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:52.259 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E 13 D7 CD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:46:35.000 UTC",
#       "not  after"         : "2024-01-23 18:46:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 2B DB A7 AB 24 31 94   7D 15 F6 D4 FD 26 B6 1E   +...$1......&..
#           0010: 93 BF AF AF                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 FD A8 DB AE 34 36 C0   F4 1D B2 8A 9E B7 F7 72  .....46........r
#           0010: 97 62 33 AB                                        .b3.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 C6 E7 33",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:46:28.000 UTC",
#       "not  after"         : "2024-01-23 18:46:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C 6E 80 BF 08 80 03 81   46 EB 93 9D 2E EB 19 80  .n......F.......
#           0010: 1B 9E CC 46                                        ...F
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 2B DB A7 AB 24 31 94   7D 15 F6 D4 FD 26 B6 1E   +...$1......&..
#           0010: 93 BF AF AF                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:52.297 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6D EE F2 6E 3D F0 6F 86   9F C5 D7 ED 85 58 97 B6  m..n=.o......X..
#     0010: 8D 5F BB 3B 83 AC A9 32   EA 44 FF 9C 23 DC 28 B0  ._.;...2.D..#.(.
#     0020: BB 5C 25 F3 2B 0F 5D FF   F2 1B F2 5F 76 05 80 A0  .\%.+.]...._v...
#     0030: B9 9B 39 1E 65 F5 B0 0D   B0 F2 11 58 20 71 42 59  ..9.e......X qBY
#     0040: C0 99 6C 0E 09 70 99 47   94 72 57 52 A3 95 39 5C  ..l..p.G.rWR..9\
#     0050: 6D F1 98 05 56 E8 7E AD   84 69 3C 60 BD EE 88 59  m...V....i<`...Y
#     0060: B1 7B E3 4D E2 28 EF 76   D5 F9 95 A0 3B C7 EB DB  ...M.(.v....;...
#     0070: 5B 11 13 06 25 2E 92 29   97 9D 0E C7 9F 16 E2 0A  [...%..)........
#     0080: 8E 8A A1 BA 63 C4 2E 54   43 DA E2 6E 89 B7 17 C6  ....c..TC..n....
#     0090: F4 86 4E 4E F8 7F AD D2   CE DC 9A 91 C2 5E 23 5A  ..NN.........^#Z
#     00A0: 59 12 02 5F 66 A1 35 69   FD F8 3D 69 54 E1 5A EC  Y.._f.5i..=iT.Z.
#     00B0: 3A C7 41 17 A1 7B D3 52   E5 83 DE 89 61 65 95 DE  :.A....R....ae..
#     00C0: 5C 05 81 D9 AB 5B 49 1D   92 A4 41 22 1D 87 84 14  \....[I...A"....
#     00D0: CC C4 14 E5 9B 07 92 DA   00 03 32 9F 84 70 1C B2  ..........2..p..
#     00E0: D3 7A 47 AC 38 6C B5 E3   A7 BF 46 37 34 7F 48 16  .zG.8l....F74.H.
#     00F0: 4F 63 AF 9D C4 37 59 5C   8A FF E9 F6 DF AB 5C F8  Oc...7Y\......\.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:52.301 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6E 06 BE A7 26 03 7E 16   18 DC 48 EB 46 77 62 12  n...&.....H.Fwb.
#     0010: 27 95 3A DD C4 85 7C DE   B3 C4 DE 82 95 8C 2F 0C  '.:.........../.
#     0020: 41 8E A2 D7 98 E6 89 6C   D4 A7 09 BC A1 31 C5 BE  A......l.....1..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:52.307 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:46:52.381 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:46:52.382 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:46:52.382 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:46:52.382 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:46:52.405 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "29 DE B7 D2 F6 2F D5 B2 49 17 4F EC 10 B1 3B 0E 08 B5 ED B0 1E 43 2A C5 63 10 F3 98 2B 92 95 79",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 18:46:52.746 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 18:46:52.748 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-25 18:46:52.768 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-25 18:46:54.076; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 18:46:54.081; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 18:46:54.751; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-y8uoKS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-y8uoKS/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:46:54.753; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-y8uoKS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-y8uoKS/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:46:54.755; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-y8uoKS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-y8uoKS/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:46:54.810 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E 13 D7 CD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:46:35.000 UTC",
#     "not  after"         : "2024-01-23 18:46:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 2B DB A7 AB 24 31 94   7D 15 F6 D4 FD 26 B6 1E   +...$1......&..
#         0010: 93 BF AF AF                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 FD A8 DB AE 34 36 C0   F4 1D B2 8A 9E B7 F7 72  .....46........r
#         0010: 97 62 33 AB                                        .b3.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 C6 E7 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:46:28.000 UTC",
#     "not  after"         : "2024-01-23 18:46:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 6E 80 BF 08 80 03 81   46 EB 93 9D 2E EB 19 80  .n......F.......
#         0010: 1B 9E CC 46                                        ...F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 2B DB A7 AB 24 31 94   7D 15 F6 D4 FD 26 B6 1E   +...$1......&..
#         0010: 93 BF AF AF                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:46:54.814 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 D2 74 FD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:46:26.000 UTC",
#     "not  after"         : "2024-01-23 18:46:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 6E 80 BF 08 80 03

[...truncated too long message...]

  }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:47:44.201 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 73 EA 2B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:47:09.000 UTC",
#     "not  after"         : "2024-01-23 18:47:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 77 62 9D CB A1 BA 31   C3 50 E3 0E 12 5A 3E 65  .wb....1.P...Z>e
#         0010: 37 50 43 FE                                        7PC.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 3D F4 8B 63 37 07 83   0C 84 4A 2D E0 6F 88 DA  Q=..c7....J-.o..
#         0010: F8 78 43 83                                        .xC.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 2B 23 1F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:47:07.000 UTC",
#     "not  after"         : "2024-01-23 18:47:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 77 62 9D CB A1 BA 31   C3 50 E3 0E 12 5A 3E 65  .wb....1.P...Z>e
#         0010: 37 50 43 FE                                        7PC.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:47:44.220 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 18896ms
ok 65 stop command for single port in 20853ms
not ok 66 status detects locally running solr in 4073ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 5770 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 23253 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20111 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 5770 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 23253 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20111 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 250ms
ok 68 listing out files in 5659ms
ok 69 copying files around in 6665ms
ok 70 upconfig in 2809ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1249ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1238ms
not ok 73 Cleanup in 4875ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 5770 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 23253 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20111 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 5770 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 23253 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20111 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 5m 36s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/axgo4mlkfkc5s

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 883 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/883/

All tests passed

Build Log:
[...truncated 1172 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196609ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3755ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-25 13:50:47.540; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:50:47.593; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1272ms
not ok 8 accept d option with builtin config in 4630ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-25 13:50:51.297; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:50:53.552; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 3582ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-25 13:50:55.958; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:50:57.123; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2476ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-25 13:50:59.599; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:50:59.651; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2408ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-25 13:51:02.038; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:51:02.093; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 4531ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-25 13:51:04.385; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:51:06.650; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 3502ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-25 13:51:08.961; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:51:10.137; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3405ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-25 13:51:18.841; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:51:18.900; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 4542ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-25 13:51:21.212; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:51:23.466; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 3469ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-25 13:51:25.805; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:51:26.963; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2353ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-25 13:51:29.288; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:51:29.340; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 24121ms
ok 19 Check export command in 22688ms
ok 20 export fails on non cloud mode in 8886ms
not ok 21 using curl to extract a single pdf file in 9570ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 38711 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38711 (pid=27391). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-25 13:52:33.722; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:52:34.876; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8415ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 38711 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38711 (pid=27813). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-25 13:52:43.258; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:52:43.310; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 9733ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 38711 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38711 (pid=28269). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-25 13:52:51.883; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:52:53.038; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30657ms
ok 25 start help flag prints help in 188ms
ok 26 stop help flag prints help in 165ms
ok 27 restart help flag prints help in 172ms
ok 28 status help flag prints help in 55ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 162ms
ok 30 create help flag prints help in 165ms
ok 31 createcore help flag prints help in 177ms
ok 32 createcollection help flag prints help in 169ms
ok 33 delete help flag prints help in 169ms
ok 34 version help flag prints help in 56ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 170ms
ok 36 auth help flag prints help in 170ms
ok 37 assert help flag prints help in 956ms
ok 38 post help flag prints help in 980ms
not ok 39 SQL Module in 10090ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:38711/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-25 13:53:38.052; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:53:38.108; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:38711/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19009ms
not ok 41 icu collation in analysis-extras module in 10041ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-25 13:54:05.984; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:54:07.155; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1337ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 5770 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 5770 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10492ms
not ok 44 deploying and undeploying a collection level package in 196337ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 38711 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38711 (pid=32390). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 13617ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-25 13:57:45.797; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:57:46.969; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-25 13:57:48.014; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:57:49.182; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 12700ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-25 13:57:59.574; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:57:59.650; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-25 13:58:00.688; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:58:01.843; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3990ms
not ok 48 basic post with a type specified in 1376ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1253ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1266ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1253ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1433ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1366ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1379ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 3635ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-25 13:58:29.592; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:58:29.650; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 4727ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-25 13:58:32.092; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 13:58:34.362; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 57 allowPaths - backup in 18400ms
ok 58 start solr with ssl in 18093ms
ok 59 use different hostname when not checking peer-name in 30076ms
ok 60 start solr with ssl and auth in 16640ms
ok 61 start solr with client truststore and security manager in 22008ms
not ok 62 start solr with mTLS needed in 38077ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-5TbZGF/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 38711 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38711 (pid=10417). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 38712 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38712 (pid=10526). Happy searching!
#
#     INFO  - 2023-10-25 14:00:45.411; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 14:00:45.416; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 14:00:46.169; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-5TbZGF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5TbZGF/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 14:00:46.171; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-5TbZGF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5TbZGF/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 14:00:46.171; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-5TbZGF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5TbZGF/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 14:00:46.254 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 96 C6 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 14:00:32.000 UTC",
#     "not  after"         : "2024-01-23 14:00:32.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 92 8C 7E A7 09 53 2C   55 FD AB 47 FA EF 8E A5  ......S,U..G....
#         0010: 18 73 66 95                                        .sf.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 08 81 2A 62 81 E8 9A   50 63 9F 7D E3 46 37 7B  ...*b...Pc...F7.
#         0010: 88 24 A2 FE                                        .$..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 F5 E5 D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 14:00:25.000 UTC",
#     "not  after"         : "2024-01-23 14:00:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C9 07 F3 71 03 C8 19 38   4C A6 0A 02 CF EB B5 B4  ...q...8L.......
#         0010: 88 56 79 43                                        .VyC
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 92 8C 7E A7 09 53 2C   55 FD AB 47 FA EF 8E A5  ......S,U..G....
#         0010: 18 73 66 95                                        .sf.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 14:00:46.274 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "35 34 F6 1E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 14:00:23.000 UTC",
#     "not  after"         : "2024-01-23 14:00:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C9 07 F3 71 03 C8 19 38   4C A6 0A 02 CF EB B5 B4  ...q...8L.......
#         0010: 88 56 79 43                                        .VyC
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 F5 E5 D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 14:00:25.000 UTC",
#     "not  after"         : "2024-01-23 14:00:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C9 07 F3 71 03 C8 19 38   4C A6 0A 02 CF EB B5 B4  ...q...8L.......
#         0010: 88 56 79 43                                        .VyC
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 92 8C 7E A7 09 53 2C   55 FD AB 47 FA EF 8E A5  ......S,U..G....
#         0010: 18 73 66 95                                        .sf.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 14:00:46.297 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 14:00:46.762 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 14:00:46.762 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 14:00:46.764 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 14:00:46.764 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 14:00:46.769 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 14:00:46.783 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 14:00:46.783 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 14:00:46.783 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 14:00:46.785 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F7 BF 6C A3 8E EB 2C AD D9 1B 05 77 0D 00 53 FA C4 09 54 F0 90 00 52 C1 1F 47 8C C8 C3 4E D7 7B",
#   "session id"          : "FA F1 8B 32 AE DB 70 92 D1 7E CD C1 2F 87 7A 77 82 E8 B9 CD 1B 19 63 8E 8A E9 43 E5 BA B5 DD 82",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1D 41 C2 90 62 78 94 23   0D EB 41 89 6A DC 68 3C  .A..bx.#..A.j.h<
#             0010: 87 E8 C5 23 60 AE B1 1F   C9 06 29 F3 D8 99 58 46  ...#`.....)...XF
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.908 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "75 B1 E5 73 FF 7C C6 21 3C 62 15 A1 C6 BB 37 59 47 92 07 17 58 70 F7 81 6C D7 8D 08 11 3F AC 9F",
#   "session id"          : "FA F1 8B 32 AE DB 70 92 D1 7E CD C1 2F 87 7A 77 82 E8 B9 CD 1B 19 63 8E 8A E9 43 E5 BA B5 DD 82",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 64 17 21 56 68 AE 67 51   91 1A EE A3 21 45 29 E9  d.!Vh.gQ....!E).
#           0010: 9A 6B 71 0C E3 00 D0 C6   DC D2 BA 08 0B 4A 88 54  .kq..........J.T
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.908 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.909 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.910 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.910 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.910 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.910 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.910 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.910 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.910 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.910 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.912 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.912 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.913 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.913 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.913 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.914 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.914 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.914 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.914 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 14:00:46.914 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 14:00:46.914 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.914 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.914 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.933 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.934 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.935 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.940 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.940 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.940 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.940 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.940 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 14:00:46.941 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 14:00:46.941 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.942 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.942 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.942 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.942 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.953 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.954 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 14:00:46.954 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.956 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "17 DC B4 BF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 14:00:28.000 UTC",
#       "not  after"         : "2024-01-23 14:00:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 92 8C 7E A7 09 53 2C   55 FD AB 47 FA EF 8E A5  ......S,U..G....
#           0010: 18 73 66 95                                        .sf.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5C D2 CD E5 08 EF 7B F7   57 7A 8A 5A 1B 01 87 F4  \.......Wz.Z....
#           0010: CE BE 08 13                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:46.956 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:47.082 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 F5 E5 D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 14:00:25.000 UTC",
#     "not  after"         : "2024-01-23 14:00:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C9 07 F3 71 03 C8 19 38   4C A6 0A 02 CF EB B5 B4  ...q...8L.......
#         0010: 88 56 79 43                                        .VyC
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 92 8C 7E A7 09 53 2C   55 FD AB 47 FA EF 8E A5  ......S,U..G....
#         0010: 18 73 66 95                                        .sf.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:47.087 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0A B6 64 A3 55 68 C3 6B   B0 25 55 65 DF 71 A9 0A  ..d.Uh.k.%Ue.q..
#     0010: 0A B0 95 A5 37 74 21 FD   62 82 92 B3 B1 EE CF 36  ....7t!.b......6
#     0020: A9 7B 8E A0 90 CB F2 58   6A A9 54 02 02 74 42 59  .......Xj.T..tBY
#     0030: 44 F7 72 06 3B 25 A4 96   CE EF D7 F9 AA ED 17 5B  D.r.;%.........[
#     0040: 51 43 95 00 51 34 49 07   EB 35 A6 98 A7 D8 A5 42  QC..Q4I..5.....B
#     0050: 37 91 05 F7 7B AB 1B 4A   61 51 FA 22 9C 5E A7 5C  7......JaQ.".^.\
#     0060: 97 3C 47 A3 C9 06 0B DC   46 3B 1E F9 F9 15 91 E4  .<G.....F;......
#     0070: 2D 82 45 7A 3B 73 97 7C   3F 0D ED 0E 17 AC B1 E5  -.Ez;s..?.......
#     0080: 75 5F CC CA 63 6F A4 2A   F1 8D 93 34 4F DA 00 3F  u_..co.*...4O..?
#     0090: A2 2C 11 C8 A0 B9 B1 83   7C 62 EC 01 F7 B5 B2 60  .,.......b.....`
#     00A0: 00 48 CB 37 68 0E 54 87   2E 09 28 AD 3F 76 D8 17  .H.7h.T...(.?v..
#     00B0: 62 5F CB BC 88 44 DE 0F   51 F6 19 7D 47 26 01 96  b_...D..Q...G&..
#     00C0: E1 D6 C7 F3 54 3E 00 2D   1D D3 3A F9 1E 9F 00 81  ....T>.-..:.....
#     00D0: 37 94 C8 90 51 C9 9B 57   26 6C 5F 8F 2C F9 C2 D9  7...Q..W&l_.,...
#     00E0: FA C7 E4 20 8E 66 77 17   A5 E1 27 96 90 1C 10 EB  ... .fw...'.....
#     00F0: 75 F7 1F A3 B0 C0 40 0F   F1 75 F1 79 6F 4D 21 DB  u.....@..u.yoM!.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:47.088 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 08 1E D6 08 B9 BA 45 3B   8E C9 44 5F 0C 78 21 0C  ......E;..D_.x!.
#     0010: 3C 57 4D 16 13 86 62 5E   BE 8E 51 D2 DA 2A 93 DF  <WM...b^..Q..*..
#     0020: EB 5C 22 C6 D6 2B 6A 4A   4D AA EF 4F 25 5D C0 F5  .\"..+jJM..O%]..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:47.090 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 14:00:47.091 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 14:00:47.091 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 14:00:47.091 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 14:00:47.091 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 14:00:47.091 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 14:00:47.091 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:47.092 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:47.093 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 96 C6 CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 14:00:32.000 UTC",
#       "not  after"         : "2024-01-23 14:00:32.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 92 8C 7E A7 09 53 2C   55 FD AB 47 FA EF 8E A5  ......S,U..G....
#           0010: 18 73 66 95                                        .sf.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 08 81 2A 62 81 E8 9A   50 63 9F 7D E3 46 37 7B  ...*b...Pc...F7.
#           0010: 88 24 A2 FE                                        .$..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 F5 E5 D2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 14:00:25.000 UTC",
#       "not  after"         : "2024-01-23 14:00:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C9 07 F3 71 03 C8 19 38   4C A6 0A 02 CF EB B5 B4  ...q...8L.......
#           0010: 88 56 79 43                                        .VyC
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 92 8C 7E A7 09 53 2C   55 FD AB 47 FA EF 8E A5  ......S,U..G....
#           0010: 18 73 66 95                                        .sf.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:47.513 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 B6 91 14 F1 4B 1E A2   C5 77 3D 9E 3F F4 37 68  Q....K...w=.?.7h
#     0010: C9 72 6F D7 29 49 B3 9D   CD 25 F8 00 DF 1E B9 F7  .ro.)I...%......
#     0020: 85 6B 79 61 41 36 85 D9   A5 64 81 31 2B 06 E6 83  .kyaA6...d.1+...
#     0030: C7 8C 95 17 C5 03 9C AD   6D A6 BA 8F 75 E1 68 73  ........m...u.hs
#     0040: 58 87 EA CC A8 6F E2 33   DB B4 76 11 5C 3E BF E6  X....o.3..v.\>..
#     0050: 9B 06 22 90 E9 CA 57 05   9A 1D 0C E6 37 7E 08 35  .."...W.....7..5
#     0060: DD 86 66 33 E7 90 86 B0   5B F1 BD A3 18 66 EE 0E  ..f3....[....f..
#     0070: FB C1 B2 1B 3E BE BF 5D   10 50 25 34 0F D5 44 6A  ....>..].P%4..Dj
#     0080: BE BB 91 59 B0 0C 9C 8E   CA 22 14 B8 27 EB 6B 44  ...Y....."..'.kD
#     0090: 51 F9 CC AE 19 E7 D6 EC   54 3A 35 E8 44 75 CD BB  Q.......T:5.Du..
#     00A0: 79 A9 FA 1E 47 23 CD DE   B6 41 B7 DD 8F 5F 23 D5  y...G#...A..._#.
#     00B0: 99 2E 36 64 5F 32 5B 53   34 C4 F1 65 1C 13 83 37  ..6d_2[S4..e...7
#     00C0: 90 AB BD 53 C4 EA 54 2D   9F DB 3B F5 C3 8B F4 FA  ...S..T-..;.....
#     00D0: 79 61 01 78 3D BE AA 2D   A0 56 66 C5 2B 8A 8A 48  ya.x=..-.Vf.+..H
#     00E0: 36 F9 7F 71 C0 77 FE F1   F2 7C 86 9C CF 31 D3 8C  6..q.w.......1..
#     00F0: 73 8C 00 C4 BA E4 B1 49   DC 01 8A 98 65 19 17 6F  s......I....e..o
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:47.515 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 99 79 1A CD B5 10 E1 63   93 C2 C2 2C 15 6C 52 27  .y.....c...,.lR'
#     0010: BA 34 5D 34 88 FF 55 29   22 E5 C1 93 71 36 1B 83  .4]4..U)"...q6..
#     0020: 3D 08 E9 F5 7B FC 7C 06   2B 75 6B F5 80 75 1A 3A  =.......+uk..u.:
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:47.515 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 14:00:47.553 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 14:00:47.553 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 14:00:47.553 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 14:00:47.553 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 14:00:47.619 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "2D 2C 8B 25 73 BB EF AF 91 08 A3 E9 84 2F 67 92 26 A4 F1 55 7D 7C C5 06 E5 DA C2 0F 72 EE 20 8A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 14:00:47.900 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 14:00:47.901 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-25 14:00:50.169; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 14:00:50.173; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 14:00:50.551; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-5TbZGF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5TbZGF/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 14:00:50.554; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-5TbZGF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5TbZGF/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 14:00:50.554; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-5TbZGF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5TbZGF/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 14:00:50.595 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 96 C6 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 14:00:32.000 UTC",
#     "not  after"         : "2024-01-23 14:00:32.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 92 8C 7E A7 09 53 2C   55 FD AB 47 FA EF 8E A5  ......S,U..G....
#         0010: 18 73 66 95                                        .sf.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 08 81 2A 62 81 E8 9A   50 63 9F 7D E3 46 37 7B  ...*b...Pc...F7.
#         0010: 88 24 A2 FE                                        .$..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 F5 E5 D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 14:00:25.000 UTC",
#     "not  after"         : "2024-01-23 14:00:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C9 07 F3 71 03 C8 19 38   4C A6 0A 02 CF EB B5 B4  ...q...8L.......
#         0010: 88 56 79 43                                        .VyC
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 92 8C 7E A7 09 53 2C   55 FD AB 47 FA EF 8E A5  ......S,U..G....
#         0010: 18 73 66 95                                        .sf.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 14:00:50.599 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "35 34 F6 1E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 14:00:23.000 UTC",
#     "not  after"         : "2024-01-23 14:00:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C9 07 F3 71 03 C8 19 38   4C A6 0A 02 CF EB B5 B4  ...q...8L.......
#         0010: 88 56 79 43                                        .VyC
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 F5 E5 D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 14:00:25.000 UTC",
#     "not  after"         : "2024-01-23 14:00:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C9 07 F3 71 03 C8 19 38   4C A6 0A 02 CF EB B5 B4  ...q...8L.......
#         0010: 88 56 79 43                                        .VyC
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 92 8C 7E A7 09 53 2C   55 FD AB 47 FA EF 8E A5  ......S,U..G....
#         0010: 18 73 66 95                                        .sf.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 14:00:50.611 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 14:00:50.778 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 14:00:50.778 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 14:00:50.780 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 14:00:50.780 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 14:00:50.784 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 14:00:50.795 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 14:00:50.795 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 14:00:50.795 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 14:00:50.797 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7C BF 5C FA 74 A9 E2 87 A4 5C ED 2B 44 0C C5 1E C7 37 94 F3 43 5F 65 81 F6 78 A3 A2 08 7C E9 95",
#   "session id"          : "0C C6 55 00 C8 62 FC F1 B2 DD CE DB 25 9F D0 51 4D 76 87 B7 5B 1E FF 21 E6 18 93 92 1C E7 6B DF",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ff

[...truncated too long message...]

"not  after"         : "2024-01-23 14:01:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED BB 68 90 F4 6D 4C 72   06 A9 9D 51 3C D8 D4 13  ..h..mLr...Q<...
#         0010: 66 98 1A 62                                        f..b
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 6C F0 E8 35 A4 7E 4A   DA 02 92 B3 AD 3F 77 C9  .l..5..J.....?w.
#         0010: CA 09 7F 8D                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 E9 D4 CB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 14:01:01.000 UTC",
#     "not  after"         : "2024-01-23 14:01:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED BB 68 90 F4 6D 4C 72   06 A9 9D 51 3C D8 D4 13  ..h..mLr...Q<...
#         0010: 66 98 1A 62                                        f..b
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 14:01:33.028 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 14:01:33.124 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 14:01:33.124 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 14:01:33.124 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 14:01:33.124 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 15379ms
ok 65 stop command for single port in 17741ms
not ok 66 status detects locally running solr in 3744ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 5770 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 23253 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20111 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 5770 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 23253 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20111 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 244ms
ok 68 listing out files in 5003ms
ok 69 copying files around in 15307ms
ok 70 upconfig in 2839ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1238ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1232ms
not ok 73 Cleanup in 4780ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 5770 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 23253 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20111 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 5770 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 23253 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20111 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 6m 7s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/qhk6iom4lolpc

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 882 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/882/

All tests passed

Build Log:
[...truncated 1173 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196728ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3455ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-25 02:55:06.967; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:55:07.024; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1245ms
not ok 8 accept d option with builtin config in 3554ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-25 02:55:10.684; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:55:11.846; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 3540ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-25 02:55:14.261; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:55:15.429; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 5751ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-25 02:55:17.857; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:55:21.211; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 5632ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-25 02:55:23.526; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:55:26.881; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2332ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-25 02:55:29.168; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:55:29.231; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2343ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-25 02:55:31.558; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:55:31.611; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 4539ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-25 02:55:40.257; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:55:41.416; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 3451ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-25 02:55:43.753; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:55:44.906; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2339ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-25 02:55:47.214; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:55:47.270; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2320ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-25 02:55:49.554; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:55:49.617; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 27563ms
ok 19 Check export command in 22447ms
ok 20 export fails on non cloud mode in 8690ms
not ok 21 using curl to extract a single pdf file in 8403ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 33837 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33837 (pid=19702). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-25 02:56:56.940; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:56:56.992; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8773ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 33837 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33837 (pid=20165). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-25 02:57:05.722; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:57:05.778; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8759ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 33837 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33837 (pid=20592). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-25 02:57:14.537; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:57:14.591; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30484ms
ok 25 start help flag prints help in 175ms
ok 26 stop help flag prints help in 178ms
ok 27 restart help flag prints help in 182ms
ok 28 status help flag prints help in 55ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 168ms
ok 30 create help flag prints help in 165ms
ok 31 createcore help flag prints help in 170ms
ok 32 createcollection help flag prints help in 170ms
ok 33 delete help flag prints help in 167ms
ok 34 version help flag prints help in 55ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 175ms
ok 36 auth help flag prints help in 172ms
ok 37 assert help flag prints help in 938ms
ok 38 post help flag prints help in 987ms
not ok 39 SQL Module in 9968ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:33837/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-25 02:57:59.260; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:57:59.310; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:33837/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19155ms
not ok 41 icu collation in analysis-extras module in 9705ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-25 02:58:27.057; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 02:58:28.210; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1359ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 5770 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 5770 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10094ms
not ok 44 deploying and undeploying a collection level package in 196374ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 33837 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33837 (pid=24742). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 13929ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-25 03:02:06.736; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 03:02:07.893; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-25 03:02:08.961; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 03:02:10.122; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 13806ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-25 03:02:20.665; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 03:02:20.728; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-25 03:02:21.743; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 03:02:24.004; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3864ms
not ok 48 basic post with a type specified in 1365ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1296ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1244ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1241ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1394ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1360ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1385ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 7851ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-25 03:02:51.296; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 03:02:55.756; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2424ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-25 03:02:58.172; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 03:02:58.239; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10264ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:33837/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-eyHZbG%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-25 03:03:08.564; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 03:03:08.619; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:33837/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-eyHZbG%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 13589ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 33837 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33837 (pid=31125). Happy searching!
#
#     INFO  - 2023-10-25 03:03:16.158; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 03:03:16.162; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 03:03:16.553; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-eyHZbG/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-eyHZbG/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-25 03:03:19.848; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-25 03:03:19.853; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-25 03:03:21.425; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 03:03:21.431; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12804ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 33837 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33837 (pid=31745). Happy searching!
#
#     INFO  - 2023-10-25 03:03:29.674; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 03:03:29.678; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 03:03:30.194; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-eyHZbG/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-eyHZbG/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-25 03:03:30.320; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-eyHZbG/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-eyHZbG/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-25 03:03:30.320; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-eyHZbG/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-eyHZbG/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-25 03:03:33.173; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-25 03:03:33.177; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-25 03:03:33.642; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@24f360b2[provider=null,keyStore=file:///tmp/bats-run-eyHZbG/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-eyHZbG/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-25 03:03:33.644; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@24f360b2[provider=null,keyStore=file:///tmp/bats-run-eyHZbG/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-eyHZbG/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-25 03:03:34.782; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 03:03:34.798; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-25 03:03:35.225; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-eyHZbG/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-eyHZbG/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-25 03:03:35.226; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-eyHZbG/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-eyHZbG/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10936ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 33837 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33837 (pid=32299). Happy searching!
#
#     INFO  - 2023-10-25 03:03:42.567; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 03:03:42.573; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-25 03:03:45.504; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 03:03:45.512; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13174ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-25 03:03:54.262; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-25 03:03:57.541; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-25 03:03:59.050; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 39667ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-eyHZbG/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 33837 [|]   [/]   [-]   [\]
# Started Solr server on port 33837 (pid=1598). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 33838 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]  
# Started Solr server on port 33838 (pid=1708). Happy searching!
#
#     INFO  - 2023-10-25 03:04:24.802; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 03:04:24.808; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 03:04:25.169; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-eyHZbG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eyHZbG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 03:04:25.172; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-eyHZbG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eyHZbG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 03:04:25.172; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(ca,h=[localhost],a=[],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-eyHZbG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eyHZbG/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 03:04:25.214 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "07 86 B7 C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:04:11.000 UTC",
#     "not  after"         : "2024-01-23 03:04:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 26 B1 69 A2 01 83 74   3C 55 95 FF E0 FE 93 CB  Q&.i...t<U......
#         0010: 2A D0 7E 94                                        *...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB B8 A4 C5 39 53 7D AD   CA 67 D4 AA 23 2C FE 37  ....9S...g..#,.7
#         0010: 31 A5 1F 9D                                        1...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F CD 48 D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:04:04.000 UTC",
#     "not  after"         : "2024-01-23 03:04:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 7C 79 21 50 9F A6 98   D3 35 CE D3 C2 AB 3B 04  ..y!P....5....;.
#         0010: 8E 4A 5C 2F                                        .J\/
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 26 B1 69 A2 01 83 74   3C 55 95 FF E0 FE 93 CB  Q&.i...t<U......
#         0010: 2A D0 7E 94                                        *...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 03:04:25.218 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F CD 48 D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:04:04.000 UTC",
#     "not  after"         : "2024-01-23 03:04:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 7C 79 21 50 9F A6 98   D3 35 CE D3 C2 AB 3B 04  ..y!P....5....;.
#         0010: 8E 4A 5C 2F                                        .J\/
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 26 B1 69 A2 01 83 74   3C 55 95 FF E0 FE 93 CB  Q&.i...t<U......
#         0010: 2A D0 7E 94                                        *...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 1D 77 A3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:04:02.000 UTC",
#     "not  after"         : "2024-01-23 03:04:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 7C 79 21 50 9F A6 98   D3 35 CE D3 C2 AB 3B 04  ..y!P....5....;.
#         0010: 8E 4A 5C 2F                                        .J\/
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 03:04:25.229 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 03:04:25.854 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 03:04:25.854 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 03:04:25.857 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 03:04:25.857 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 03:04:25.861 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 03:04:25.872 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 03:04:25.872 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 03:04:25.872 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 03:04:25.874 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "97 02 FA CC DA 0E AD 6B 2E 04 2C 50 22 B6 E2 9F CB 3B 5C B0 18 FF 27 82 0A 09 E1 9A B9 51 36 3A",
#   "session id"          : "67 7D 57 24 79 EB 73 5F 2F 02 FC 3F 98 41 BA BF FB 7F E9 15 31 1A 2F C0 00 DF 40 26 73 11 F5 E2",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6C F8 C4 6A 2E DA 4E 86   89 97 C3 7F FD 7A 73 CC  l..j..N......zs.
#             0010: 9F 79 FA 72 BB 91 87 B7   09 C7 3D 7F 3D CB 46 74  .y.r......=.=.Ft
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:25.996 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B3 BD 94 1E 57 B3 DE 3C 5A 5B A5 03 BD B2 02 67 E7 24 C0 16 26 C2 F2 24 47 58 0A 62 1A EA DB 1A",
#   "session id"          : "67 7D 57 24 79 EB 73 5F 2F 02 FC 3F 98 41 BA BF FB 7F E9 15 31 1A 2F C0 00 DF 40 26 73 11 F5 E2",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 36 67 5E 93 37 67 8D 74   34 AF 09 F9 5C 16 D9 BC  6g^.7g.t4...\...
#           0010: D8 9C BE 35 3F 8E 54 17   05 20 CD B4 93 D0 9B 4A  ...5?.T.. .....J
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:25.997 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:25.997 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:25.999 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:25.999 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:25.999 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.000 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.000 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.000 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.000 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.001 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.004 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.010 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.010 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.010 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.011 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.011 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.012 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.012 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.012 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.012 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 03:04:26.012 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 03:04:26.012 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.012 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.012 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.039 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.041 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.045 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.072 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.072 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.072 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.072 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.072 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 03:04:26.072 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 03:04:26.073 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.074 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.074 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.074 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.078 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.080 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.080 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 03:04:26.081 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.089 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 DB 1D 96",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 03:04:07.000 UTC",
#       "not  after"         : "2024-01-23 03:04:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 26 B1 69 A2 01 83 74   3C 55 95 FF E0 FE 93 CB  Q&.i...t<U......
#           0010: 2A D0 7E 94                                        *...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 79 F1 D9 BF 74 4B FA 3D   08 72 B5 FB 46 9E 37 2C  y...tK.=.r..F.7,
#           0010: 20 A2 E8 50                                         ..P
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.089 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 03:04:26.191 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F CD 48 D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:04:04.000 UTC",
#     "not  after"         : "2024-01-23 03:04:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 7C 79 21 50 9F A6 98   D3 35 CE D3 C2 AB 3B 04  ..y!P....5....;.
#         0010: 8E 4A 5C 2F                                        .J\/
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.1

[...truncated too long message...]

     }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 03:05:12.628 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 5E 0E DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:04:42.000 UTC",
#     "not  after"         : "2024-01-23 03:04:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B0 41 8F 12 54 81 9C 8C   38 5B 46 FD 23 3B 5D 27  .A..T...8[F.#;]'
#         0010: 7C AF 31 61                                        ..1a
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 19 C2 9B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:04:44.000 UTC",
#     "not  after"         : "2024-01-23 03:04:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B0 41 8F 12 54 81 9C 8C   38 5B 46 FD 23 3B 5D 27  .A..T...8[F.#;]'
#         0010: 7C AF 31 61                                        ..1a
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 1E 00 37 19 39 CA 18   C9 15 1D 16 12 96 5C 4C  *..7.9........\L
#         0010: F8 64 96 B8                                        .d..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 03:05:12.639 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14198ms
ok 65 stop command for single port in 17385ms
not ok 66 status detects locally running solr in 3731ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 5770 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 13534 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1211 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 5770 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 13534 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1211 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 268ms
ok 68 listing out files in 12794ms
ok 69 copying files around in 7660ms
ok 70 upconfig in 2802ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1225ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1238ms
not ok 73 Cleanup in 4713ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 5770 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 13534 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1211 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 5770 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 13534 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1211 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 5m 11s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/ny6zgex2pe6cu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 881 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/881/

All tests passed

Build Log:
[...truncated 1171 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196681ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 4716ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-24 16:12:19.363; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:12:20.526; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 2403ms
not ok 8 accept d option with builtin config in 5726ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-24 16:12:25.341; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:12:28.697; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2397ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-24 16:12:31.095; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:12:31.147; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2460ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-24 16:12:33.548; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:12:33.612; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 6797ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-24 16:12:35.985; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:12:40.447; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 3522ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-24 16:12:42.792; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:12:43.963; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2375ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-24 16:12:46.354; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:12:46.407; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 5378ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-24 16:12:54.764; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:12:57.048; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 3546ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-24 16:12:59.417; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:13:00.586; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 5721ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-24 16:13:03.020; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:13:06.381; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2350ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-24 16:13:08.699; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:13:08.759; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 25444ms
ok 19 Check export command in 22565ms
ok 20 export fails on non cloud mode in 8682ms
not ok 21 using curl to extract a single pdf file in 10689ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 38145 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38145 (pid=28032). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-24 16:14:14.104; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:14:16.363; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 10687ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 38145 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38145 (pid=28511). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-24 16:14:24.817; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:14:27.077; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8314ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 38145 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38145 (pid=28967). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-24 16:14:35.402; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:14:35.459; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30489ms
ok 25 start help flag prints help in 183ms
ok 26 stop help flag prints help in 166ms
ok 27 restart help flag prints help in 178ms
ok 28 status help flag prints help in 56ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 165ms
ok 30 create help flag prints help in 170ms
ok 31 createcore help flag prints help in 171ms
ok 32 createcollection help flag prints help in 176ms
ok 33 delete help flag prints help in 171ms
ok 34 version help flag prints help in 56ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 172ms
ok 36 auth help flag prints help in 169ms
ok 37 assert help flag prints help in 958ms
ok 38 post help flag prints help in 974ms
not ok 39 SQL Module in 12526ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:38145/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-24 16:15:20.457; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:15:22.727; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:38145/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 21417ms
not ok 41 icu collation in analysis-extras module in 9864ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-24 16:15:52.885; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:15:54.043; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1353ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 5770 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 5770 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10050ms
ok 44 deploying and undeploying a collection level package in 13719ms
not ok 45 Affinity placement plugin using sysprop in 11792ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-24 16:16:30.077; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:16:30.130; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-24 16:16:31.131; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:16:31.186; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 18262ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-24 16:16:41.660; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:16:42.833; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-24 16:16:43.908; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:16:49.489; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3889ms
not ok 48 basic post with a type specified in 1354ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1324ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1354ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1264ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1376ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1415ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1402ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 4688ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-24 16:17:18.176; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:17:18.342; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 4375ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-24 16:17:21.584; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:17:22.756; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 18209ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:38145/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-WmCJai%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-24 16:17:35.467; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:17:41.039; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:38145/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-WmCJai%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
ok 58 start solr with ssl in 24135ms
ok 59 use different hostname when not checking peer-name in 37560ms
not ok 60 start solr with ssl and auth in 10589ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 38145 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38145 (pid=10458). Happy searching!
#
#     INFO  - 2023-10-24 16:18:50.329; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-24 16:18:50.333; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-24 16:18:53.144; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-24 16:18:53.154; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13871ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-24 16:19:01.821; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-24 16:19:05.424; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-24 16:19:07.135; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 39777ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-WmCJai/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 38145 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38145 (pid=12047). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 38146 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 38146 (pid=12157). Happy searching!
#
#     INFO  - 2023-10-24 16:19:32.925; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-24 16:19:32.943; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-24 16:19:33.728; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-WmCJai/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WmCJai/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-24 16:19:33.730; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-WmCJai/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WmCJai/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-24 16:19:33.731; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(ca,h=[localhost],a=[],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-WmCJai/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WmCJai/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-24 16:19:33.809 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 4A FE 09",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:19:18.000 UTC",
#     "not  after"         : "2024-01-22 16:19:18.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AA 37 5A 34 26 24 73 9A   58 87 36 A0 6F BD D9 3E  .7Z4&$s.X.6.o..>
#         0010: 42 79 0E 1B                                        By..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 CE A3 47 F0 88 58 B2   E9 D0 38 E3 2F 70 EF 91  ...G..X...8./p..
#         0010: EF FF C4 4B                                        ...K
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 C0 AE 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:19:12.000 UTC",
#     "not  after"         : "2024-01-22 16:19:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 A8 79 EC FA 51 5F 06   C3 D3 96 01 24 D7 4D AF  1.y..Q_.....$.M.
#         0010: 97 AF 7F 8D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA 37 5A 34 26 24 73 9A   58 87 36 A0 6F BD D9 3E  .7Z4&$s.X.6.o..>
#         0010: 42 79 0E 1B                                        By..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-24 16:19:33.813 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 4F C0 43",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:19:10.000 UTC",
#     "not  after"         : "2024-01-22 16:19:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 A8 79 EC FA 51 5F 06   C3 D3 96 01 24 D7 4D AF  1.y..Q_.....$.M.
#         0010: 97 AF 7F 8D                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 C0 AE 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:19:12.000 UTC",
#     "not  after"         : "2024-01-22 16:19:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 A8 79 EC FA 51 5F 06   C3 D3 96 01 24 D7 4D AF  1.y..Q_.....$.M.
#         0010: 97 AF 7F 8D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA 37 5A 34 26 24 73 9A   58 87 36 A0 6F BD D9 3E  .7Z4&$s.X.6.o..>
#         0010: 42 79 0E 1B                                        By..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-24 16:19:33.831 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-24 16:19:34.387 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-24 16:19:34.387 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-24 16:19:34.388 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-24 16:19:34.389 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-24 16:19:34.401 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-24 16:19:34.423 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-24 16:19:34.423 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-24 16:19:34.423 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-24 16:19:34.428 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "37 8C 4A A5 ED F7 40 A2 27 D0 10 02 08 5D 3D F3 B4 8B 97 4A 6A 2D CB A9 4D 47 3E CB 05 A4 14 24",
#   "session id"          : "51 1D 21 D2 49 77 29 CB 3B 3C 3E DE C4 07 DD A5 5C 64 4A C7 BC 5C 01 BE B4 80 CD 58 D7 E3 89 2F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 01 DE 42 EB 18 25 56 9E   27 96 53 20 D7 94 3E 92  ..B..%V.'.S ..>.
#             0010: F9 54 4C 28 0E 6F 3B 21   13 8E 2B BF 5F 1F 33 63  .TL(.o;!..+._.3c
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.633 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FA CF 01 85 E5 FF 86 2D 38 95 52 91 D4 1E 4F D2 41 B9 7E D5 BE 97 26 09 77 98 F8 39 38 13 F5 77",
#   "session id"          : "51 1D 21 D2 49 77 29 CB 3B 3C 3E DE C4 07 DD A5 5C 64 4A C7 BC 5C 01 BE B4 80 CD 58 D7 E3 89 2F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 74 9F AD 47 85 CE 41 9C   52 7B AC 04 A3 64 1B 40  t..G..A.R....d.@
#           0010: 2D FF 8D 8E 2F 83 4A 11   72 B9 13 8C D0 BA A9 5F  -.../.J.r......_
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.634 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.634 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.635 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.636 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.636 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.637 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.637 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.637 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.637 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.637 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.640 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.645 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.646 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.646 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.647 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.647 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.647 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-24 16:19:34.652 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-24 16:19:34.652 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.670 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.688 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.691 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.711 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.711 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.712 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.714 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.714 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.714 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.715 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-24 16:19:34.715 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-24 16:19:34.715 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.717 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.717 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.718 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.720 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.731 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.731 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-24 16:19:34.731 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.736 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 70 6F ED",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 16:19:15.000 UTC",
#       "not  after"         : "2024-01-22 16:19:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AA 37 5A 34 26 24 73 9A   58 87 36 A0 6F BD D9 3E  .7Z4&$s.X.6.o..>
#           0010: 42 79 0E 1B                                        By..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 54 5B 12 9D 30 72 E8   6B 3D 41 8C 07 8A 36 6F  .T[..0r.k=A...6o
#           0010: B2 9D CB 3B                                        ...;
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:34.736 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:35.228 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 C0 AE 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:19:12.000 UTC",
#     "not  after"         : "2024-01-22 16:19:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 A8 79 EC FA 51 5F 06   C3 D3 96 01 24 D7 4D AF  1.y..Q_.....$.M.
#         0010: 97 AF 7F 8D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA 37 5A 34 26 24 73 9A   58 87 36 A0 6F BD D9 3E  .7Z4&$s.X.6.o..>
#         0010: 42 79 0E 1B                                        By..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:35.236 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 44 D4 53 D9 29 4F AB 4F   83 F7 78 02 7E 98 86 4F  D.S.)O.O..x....O
#     0010: 8E 23 BD E0 EE E0 5B 60   12 99 72 A2 96 94 9D DD  .#....[`..r.....
#     0020: EA CA E5 2C 26 25 19 CE   F7 70 39 D9 0D CF D1 20  ...,&%...p9....
#     0030: EA F4 7F CA 64 AC E4 66   9A 52 64 9C 30 FC A4 2A  ....d..f.Rd.0..*
#     0040: 1D EF 1B 41 0B 07 56 E3   94 5F 71 78 DC A3 C7 B7  ...A..V.._qx....
#     0050: 88 B0 42 3B 7D 05 08 34   9D 7F 37 EE 5F 76 62 D8  ..B;...4..7._vb.
#     0060: D0 2E 12 CC 93 9D C7 C9   A6 AE 55 26 4A 26 91 E7  ..........U&J&..
#     0070: DD 84 58 53 03 78 58 F4   13 DC 2C 4F 95 7D B7 4C  ..XS.xX...,O...L
#     0080: 69 1E E9 8F CC 45 F4 70   EC C3 28 3F AC 77 DA CC  i....E.p..(?.w..
#     0090: 3A A8 FA AE AE 37 8B 9D   52 6F 22 75 48 03 BF C0  :....7..Ro"uH...
#     00A0: 08 20 B5 10 D9 EA E3 5F   89 87 B0 CF AB FA 8F 5B  . ....._.......[
#     00B0: 11 6B 1C 31 D6 98 8D AE   93 F6 8E 0F EF C0 4D F8  .k.1..........M.
#     00C0: 17 90 34 DF 07 0A 74 B3   C8 EF 1B 4C F1 B8 51 14  ..4...t....L..Q.
#     00D0: 77 BB BF 79 47 F9 0F E4   2A 35 91 BA 23 93 97 F7  w..yG...*5..#...
#     00E0: E1 01 B8 C8 9D 8F 93 34   53 18 EF C3 82 F1 3A 6C  .......4S.....:l
#     00F0: C3 5D 64 9C EB 1C 6E E6   40 E0 23 B3 6D 77 2C 28  .]d...n.@.#.mw,(
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:35.238 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0B EA 96 5D C1 7A 6B 83   74 08 2B 8D 2D FE CD 98  ...].zk.t.+.-...
#     0010: AF 3F E7 42 1D 97 F0 05   BB CB EF 5A 4E 90 D9 42  .?.B.......ZN..B
#     0020: D0 5D A1 1F 64 23 3D ED   F1 ED 14 5B 76 D6 CF CF  .]..d#=....[v...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:35.243 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-24 16:19:35.246 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-24 16:19:35.246 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-24 16:19:35.246 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-24 16:19:35.246 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-24 16:19:35.246 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-24 16:19:35.247 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:35.247 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:35.252 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 4A FE 09",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 16:19:18.000 UTC",
#       "not  after"         : "2024-01-22 16:19:18.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AA 37 5A 34 26 24 73 9A   58 87 36 A0 6F BD D9 3E  .7Z4&$s.X.6.o..>
#           0010: 42 79 0E 1B                                        By..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 CE A3 47 F0 88 58 B2   E9 D0 38 E3 2F 70 EF 91  ...G..X...8./p..
#           0010: EF FF C4 4B                                        ...K
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 C0 AE 42",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 16:19:12.000 UTC",
#       "not  after"         : "2024-01-22 16:19:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 A8 79 EC FA 51 5F 06   C3 D3 96 01 24 D7 4D AF  1.y..Q_.....$.M.
#           0010: 97 AF 7F 8D                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AA 37 5A 34 26 24 73 9A   58 87 36 A0 6F BD D9 3E  .7Z4&$s.X.6.o..>
#           0010: 42 79 0E 1B                                        By..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:35.305 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 22 E8 70 08 69 F4 DE 71   64 5F 4F F2 43 70 51 5F  ".p.i..qd_O.CpQ_
#     0010: 13 4A 60 14 AC AA F3 C3   3B BF F4 FD 41 C1 BA 22  .J`.....;...A.."
#     0020: 27 AB 2B A1 98 98 46 81   2D D2 4E 5D 27 F2 80 7A  '.+...F.-.N]'..z
#     0030: 51 54 70 99 80 8D 66 77   AE 9A 7A F3 81 AA 7F B4  QTp...fw..z.....
#     0040: 9A C8 1A 70 06 A1 92 23   36 43 50 86 FB F5 9F 48  ...p...#6CP....H
#     0050: 2E 46 EE B0 90 A7 DD 9E   6B 3D F5 19 72 AC 28 3E  .F......k=..r.(>
#     0060: D8 8B D3 7C 95 22 20 8C   F1 46 7B C0 AE 08 47 43  ....." ..F....GC
#     0070: 2E 5A E5 CF 91 8C 10 0F   05 01 C9 58 72 0F C4 E9  .Z.........Xr...
#     0080: 78 78 D7 28 9B B4 B6 83   AD 4E 6E 62 14 CF 92 5E  xx.(.....Nnb...^
#     0090: 63 8B D2 36 A3 A4 79 E9   F8 D1 25 4F 82 DB 7F EE  c..6..y...%O....
#     00A0: DD 29 61 D7 8D D8 01 C2   E9 09 F1 2C E2 4A DA BD  .)a........,.J..
#     00B0: 87 9A 34 B0 19 8F 7C 51   41 ED 55 E9 73 1F 98 58  ..4....QA.U.s..X
#     00C0: 75 07 33 17 C6 A9 3F C1   EF 0B 09 7C AD 49 73 7B  u.3...?......Is.
#     00D0: 6F EF CD 62 C5 81 16 5A   FE 3A E9 2B 6F 9E 10 1D  o..b...Z.:.+o...
#     00E0: A4 F0 6E C2 A6 34 51 DD   4B FE BF 97 69 F6 DF C9  ..n..4Q.K...i...
#     00F0: D9 27 26 70 D2 14 66 54   33 64 07 0B D3 D1 0D 52  .'&p..fT3d.....R
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:35.312 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3D 09 20 43 65 44 DE F7   81 C4 26 21 D6 CD 94 4B  =. CeD....&!...K
#     0010: DB DB 75 F3 12 8D 64 51   C2 98 CA 9C DF 1F 76 29  ..u...dQ......v)
#     0020: 63 75 5C 79 2E 1C 09 A6   00 EA 5B FB EC 6D 7F 5B  cu\y......[..m.[
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:35.313 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-24 16:19:35.396 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A0 C2 22 56 F0 5A B7 BF F6 DE 9F 94 4C 77 F0 E5 16 AD A2 B6 BF CD 3B BB A9 2F 04 05 AA 2B 0D B0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-24 16:19:35.652 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-24 16:19:35.655 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-24 16:19:36.788; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-24 16:19:36.793; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-24 16:19:37.146; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-WmCJai/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WmCJai/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-24 16:19:37.148; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-WmCJai/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WmCJai/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-24 16:19:37.149; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-WmCJai/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WmCJai/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-24 16:19:37.189 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 4A FE 09",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:19:18.000 UTC",
#     "not  after"         : "2024-01-22 16:19:18.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A

[...truncated too long message...]

      }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-24 16:20:21.441 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 2E 32 71",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:19:50.000 UTC",
#     "not  after"         : "2024-01-22 16:19:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 3D E1 7A B0 D6 A6 49   76 9C 63 18 25 5A E2 D1  5=.z...Iv.c.%Z..
#         0010: 1A 07 D6 02                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 78 43 67",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:19:52.000 UTC",
#     "not  after"         : "2024-01-22 16:19:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 3D E1 7A B0 D6 A6 49   76 9C 63 18 25 5A E2 D1  5=.z...Iv.c.%Z..
#         0010: 1A 07 D6 02                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 F2 16 09 11 12 21 FE   87 C2 6C 27 29 51 16 7B  ......!...l')Q..
#         0010: 4F 82 71 0B                                        O.q.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-24 16:20:21.453 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14457ms
ok 65 stop command for single port in 16858ms
not ok 66 status detects locally running solr in 3833ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 5770 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 13534 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1211 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 5770 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 13534 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1211 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 261ms
ok 68 listing out files in 2600ms
ok 69 copying files around in 14410ms
ok 70 upconfig in 2841ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1230ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1230ms
not ok 73 Cleanup in 4801ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 5770 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 13534 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1211 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 5770 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 13534 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1211 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 3m 8s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/auketdjyerzso

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 880 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/880/

All tests passed

Build Log:
[...truncated 1389 lines...]
BUILD FAILED in 1h 7m 12s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/mufoqdyjkfmy4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 879 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/879/

All tests passed

Build Log:
[...truncated 1169 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196683ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 4566ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-23 23:12:32.002; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:12:33.163; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 2366ms
not ok 8 accept d option with builtin config in 4668ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-23 23:12:37.996; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:12:40.255; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2471ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-23 23:12:42.699; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:12:42.769; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2429ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-23 23:12:45.167; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:12:45.224; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 3508ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-23 23:12:47.560; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:12:48.714; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 3467ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-23 23:12:51.070; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:12:52.241; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2324ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-23 23:12:54.545; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:12:54.600; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 6891ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-23 23:13:03.415; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:13:06.774; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 5668ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-23 23:13:09.116; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:13:12.474; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 4557ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-23 23:13:14.809; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:13:17.079; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2295ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-23 23:13:19.350; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:13:19.400; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 22917ms
ok 19 Check export command in 22969ms
ok 20 export fails on non cloud mode in 10058ms
ok 21 using curl to extract a single pdf file in 16398ms
not ok 22 using the bin/solr post tool to extract content from pdf in 8801ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 34275 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34275 (pid=10202). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-23 23:14:40.727; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:14:40.841; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8675ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 34275 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34275 (pid=10662). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-23 23:14:49.487; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:14:49.543; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30998ms
ok 25 start help flag prints help in 179ms
ok 26 stop help flag prints help in 174ms
ok 27 restart help flag prints help in 183ms
ok 28 status help flag prints help in 56ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 165ms
ok 30 create help flag prints help in 166ms
ok 31 createcore help flag prints help in 166ms
ok 32 createcollection help flag prints help in 171ms
ok 33 delete help flag prints help in 164ms
ok 34 version help flag prints help in 55ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 174ms
ok 36 auth help flag prints help in 168ms
ok 37 assert help flag prints help in 956ms
ok 38 post help flag prints help in 943ms
not ok 39 SQL Module in 11230ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:34275/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-23 23:15:34.819; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:15:35.990; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:34275/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 26840ms
not ok 41 icu collation in analysis-extras module in 11085ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-23 23:16:11.696; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:16:13.955; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1391ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 729 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 729 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9975ms
not ok 44 deploying and undeploying a collection level package in 196501ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 34275 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34275 (pid=14950). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 12565ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-23 23:19:52.300; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:19:53.457; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-23 23:19:54.510; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:19:54.586; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 11463ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-23 23:20:04.919; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:20:04.977; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-23 23:20:05.987; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:20:06.056; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3809ms
not ok 48 basic post with a type specified in 1406ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1257ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1266ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1296ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1385ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1430ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1389ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 3709ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-23 23:20:33.772; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:20:33.840; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2421ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-23 23:20:36.230; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:20:36.288; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10390ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:34275/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-n3AvCI%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-23 23:20:46.716; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:20:46.795; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:34275/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-n3AvCI%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 13414ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 34275 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34275 (pid=24350). Happy searching!
#
#     INFO  - 2023-10-23 23:20:54.406; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 23:20:54.411; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-23 23:20:54.922; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-n3AvCI/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-n3AvCI/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-23 23:20:58.361; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-23 23:20:58.366; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-23 23:20:59.958; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 23:20:59.963; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13551ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 34275 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34275 (pid=24948). Happy searching!
#
#     INFO  - 2023-10-23 23:21:07.822; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 23:21:07.826; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-23 23:21:08.318; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-n3AvCI/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-n3AvCI/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-23 23:21:08.449; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-n3AvCI/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-n3AvCI/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-23 23:21:08.450; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-n3AvCI/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-n3AvCI/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-23 23:21:11.886; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-23 23:21:11.891; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-23 23:21:12.335; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@355e34c7[provider=null,keyStore=file:///tmp/bats-run-n3AvCI/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-n3AvCI/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-23 23:21:12.337; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@355e34c7[provider=null,keyStore=file:///tmp/bats-run-n3AvCI/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-n3AvCI/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-23 23:21:13.491; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 23:21:13.496; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-23 23:21:13.957; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-n3AvCI/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-n3AvCI/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-23 23:21:13.959; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-n3AvCI/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-n3AvCI/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10758ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 34275 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34275 (pid=25543). Happy searching!
#
#     INFO  - 2023-10-23 23:21:21.233; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 23:21:21.238; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-23 23:21:23.558; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 23:21:23.564; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13606ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-23 23:21:33.070; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-23 23:21:36.573; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-23 23:21:38.047; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 38191ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-n3AvCI/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 34275 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34275 (pid=27122). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 34276 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34276 (pid=27282). Happy searching!
#
#     INFO  - 2023-10-23 23:22:02.470; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 23:22:02.474; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-23 23:22:02.860; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-n3AvCI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-n3AvCI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-23 23:22:02.862; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-n3AvCI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-n3AvCI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-23 23:22:02.863; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5b970f7(ca,h=[localhost],a=[],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-n3AvCI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-n3AvCI/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-23 23:22:03.023 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 51 11 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:21:50.000 UTC",
#     "not  after"         : "2024-01-21 23:21:50.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 30 4E 88 86 1F 8F EF 1E   E4 A7 88 E3 EA EA 84 70  0N.............p
#         0010: C9 A4 BB 5A                                        ...Z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 93 B7 1F E0 58 24 FD   07 1B D0 C5 42 9C 62 9E  .....X$.....B.b.
#         0010: 7E 8B 52 D4                                        ..R.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D 60 EE 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:21:43.000 UTC",
#     "not  after"         : "2024-01-21 23:21:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 12 63 99 BD 97 9C 5C   A1 16 A7 22 BE 16 4D 46  q.c....\..."..MF
#         0010: B6 DC 2C D2                                        ..,.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 30 4E 88 86 1F 8F EF 1E   E4 A7 88 E3 EA EA 84 70  0N.............p
#         0010: C9 A4 BB 5A                                        ...Z
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 23:22:03.027 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 84 6F 20",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:21:41.000 UTC",
#     "not  after"         : "2024-01-21 23:21:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 12 63 99 BD 97 9C 5C   A1 16 A7 22 BE 16 4D 46  q.c....\..."..MF
#         0010: B6 DC 2C D2                                        ..,.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D 60 EE 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:21:43.000 UTC",
#     "not  after"         : "2024-01-21 23:21:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 12 63 99 BD 97 9C 5C   A1 16 A7 22 BE 16 4D 46  q.c....\..."..MF
#         0010: B6 DC 2C D2                                        ..,.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 30 4E 88 86 1F 8F EF 1E   E4 A7 88 E3 EA EA 84 70  0N.............p
#         0010: C9 A4 BB 5A                                        ...Z
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 23:22:03.047 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-23 23:22:03.283 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 23:22:03.283 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-23 23:22:03.287 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-23 23:22:03.287 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 23:22:03.299 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 23:22:03.331 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 23:22:03.337 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 23:22:03.337 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 23:22:03.343 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E1 0A F9 33 B6 6D AD CB 0F 7B 14 C3 8C 68 A9 AE DF 7B 6A 04 36 3D A0 79 6A 3E CC 7E BB 72 0D 1F",
#   "session id"          : "1E 57 27 04 D9 90 7A EC 97 D4 92 CB FB CA C5 BA 53 54 E1 B1 70 F1 62 00 CB CF 30 0E AF CD 63 15",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B5 22 AE 48 4C 6F D4 7B   AB BD 2A 42 92 97 AD 26  .".HLo....*B...&
#             0010: 14 DD 22 73 DB 95 1D 69   29 30 ED 47 D7 FC F9 5B  .."s...i)0.G...[
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.657 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E5 2F 4F 61 F9 C3 25 F3 CE 1F A0 7E 7D 18 EF 7F BF 7B 12 AA F1 AD D7 6F 94 18 18 9F 3C CE 39 79",
#   "session id"          : "1E 57 27 04 D9 90 7A EC 97 D4 92 CB FB CA C5 BA 53 54 E1 B1 70 F1 62 00 CB CF 30 0E AF CD 63 15",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 9A 54 3F 92 9C EE 1B 18   9D B9 53 96 61 28 DD 0D  .T?.......S.a(..
#           0010: 74 4A AD 19 F0 5A C8 03   B8 DE 46 53 E9 3B F5 6A  tJ...Z....FS.;.j
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.658 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.658 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.659 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.659 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.659 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.659 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.659 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.659 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.659 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.659 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.661 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.662 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.662 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 23:22:03.662 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 23:22:03.663 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.663 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.663 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.676 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.681 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.682 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.693 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.693 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.693 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.694 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.694 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.694 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 23:22:03.697 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 23:22:03.697 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.700 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.700 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.700 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.703 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.703 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.704 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 23:22:03.704 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.721 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F 0B C7 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 23:21:46.000 UTC",
#       "not  after"         : "2024-01-21 23:21:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 30 4E 88 86 1F 8F EF 1E   E4 A7 88 E3 EA EA 84 70  0N.............p
#           0010: C9 A4 BB 5A                                        ...Z
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 2B DC 1F 9C CB 97 11   0E 5F 72 23 47 51 67 9E  g+......._r#GQg.
#           0010: CA D3 E9 A2                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.721 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:22:03.953 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:22:03.954 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:22:03.954 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:22:03.954 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.990 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D 60 EE 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:21:43.000 UTC",
#     "not  after"         : "2024-01-21 23:21:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 12 63 99 BD 97 9C 5C   A1 16 A7 22 BE 16 4D 46  q.c....\..."..MF
#         0010: B6 DC 2C D2                                        ..,.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 30 4E 88 86 1F 8F EF 1E   E4 A7 88 E3 EA EA 84 70  0N.............p
#         0010: C9 A4 BB 5A                                        ...Z
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 23:22:03.994 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A7 EF DB EF CA FE 08 1D   B6 EF 09 01 BC CC 76 F7  ..............v.
#     0010: B0 AE 86 D7 BE B9 38 C

[...truncated too long message...]

    "not  after"         : "2024-01-21 23:22:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 9B 70 93 30 59 47 31   E5 54 2D 2C 65 D7 ED CC  Z.p.0YG1.T-,e...
#         0010: 09 3C 05 C8                                        .<..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 59 D8 B3 F3 F6 7B AC   9E 4B CA FA A6 21 B5 A6  .Y.......K...!..
#         0010: 18 2A 9A AE                                        .*..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 25 B3 E7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:22:19.000 UTC",
#     "not  after"         : "2024-01-21 23:22:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 9B 70 93 30 59 47 31   E5 54 2D 2C 65 D7 ED CC  Z.p.0YG1.T-,e...
#         0010: 09 3C 05 C8                                        .<..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 23:22:51.693 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:22:51.769 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:22:51.769 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:22:51.770 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:22:51.770 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14945ms
ok 65 stop command for single port in 18044ms
not ok 66 status detects locally running solr in 3819ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 729 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 14041 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 13534 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 729 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 14041 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 13534 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 255ms
ok 68 listing out files in 2906ms
ok 69 copying files around in 9906ms
ok 70 upconfig in 3978ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1225ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1226ms
not ok 73 Cleanup in 4905ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 729 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 14041 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 13534 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 729 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 14041 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 13534 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 31s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/epfazshf7cdhs

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 878 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/878/

All tests passed

Build Log:
[...truncated 1168 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196459ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 4526ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-23 14:56:43.993; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:56:45.148; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1226ms
not ok 8 accept d option with builtin config in 2376ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-23 14:56:48.735; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:56:48.803; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2467ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-23 14:56:51.239; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:56:51.293; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 4621ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-23 14:56:53.626; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:56:55.897; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 3422ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-23 14:56:58.237; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:56:59.391; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2373ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-23 14:57:01.730; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:57:01.790; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2334ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-23 14:57:04.102; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:57:04.157; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3386ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-23 14:57:12.769; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:57:12.819; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2289ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-23 14:57:15.079; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:57:15.138; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 3478ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-23 14:57:17.477; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:57:18.635; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 3560ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-23 14:57:21.020; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:57:22.188; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 27794ms
ok 19 Check export command in 22415ms
ok 20 export fails on non cloud mode in 8792ms
not ok 21 using curl to extract a single pdf file in 8664ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 43167 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43167 (pid=28336). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-23 14:58:30.108; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:58:30.166; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 10294ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 43167 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43167 (pid=28810). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-23 14:58:38.819; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:58:39.976; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8378ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 43167 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43167 (pid=29268). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-23 14:58:48.825; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:58:48.895; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30620ms
ok 25 start help flag prints help in 186ms
ok 26 stop help flag prints help in 166ms
ok 27 restart help flag prints help in 176ms
ok 28 status help flag prints help in 55ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 163ms
ok 30 create help flag prints help in 180ms
ok 31 createcore help flag prints help in 167ms
ok 32 createcollection help flag prints help in 168ms
ok 33 delete help flag prints help in 168ms
ok 34 version help flag prints help in 57ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 168ms
ok 36 auth help flag prints help in 170ms
ok 37 assert help flag prints help in 967ms
ok 38 post help flag prints help in 985ms
not ok 39 SQL Module in 10334ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:43167/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-23 14:59:34.060; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 14:59:34.115; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:43167/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 21274ms
not ok 41 icu collation in analysis-extras module in 10606ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-23 15:00:04.822; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 15:00:05.987; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1344ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 729 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 729 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9907ms
ok 44 deploying and undeploying a collection level package in 14153ms
not ok 45 Affinity placement plugin using sysprop in 12681ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-23 15:00:42.114; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 15:00:43.274; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-23 15:00:44.283; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 15:00:44.337; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 21522ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-23 15:00:54.749; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 15:00:58.118; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-23 15:00:59.142; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 15:01:05.804; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3931ms
not ok 48 basic post with a type specified in 1377ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1259ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1226ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1235ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1365ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1388ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1366ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 7941ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-23 15:01:33.250; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 15:01:37.712; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 3561ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-23 15:01:40.145; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 15:01:41.301; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 11299ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:43167/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-D2GluN%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-23 15:01:51.543; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 15:01:52.719; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:43167/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-D2GluN%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 13553ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 43167 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43167 (pid=5548). Happy searching!
#
#     INFO  - 2023-10-23 15:02:00.265; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 15:02:00.269; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-23 15:02:00.658; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-D2GluN/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-D2GluN/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-23 15:02:03.932; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-23 15:02:03.936; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-23 15:02:05.470; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 15:02:05.475; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13115ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 43167 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43167 (pid=6147). Happy searching!
#
#     INFO  - 2023-10-23 15:02:13.974; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 15:02:13.982; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-23 15:02:14.498; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@44c79f32(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-D2GluN/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-D2GluN/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-23 15:02:14.648; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-D2GluN/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-D2GluN/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-23 15:02:14.648; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-D2GluN/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-D2GluN/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-23 15:02:17.300; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-23 15:02:17.304; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-23 15:02:17.965; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-D2GluN/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-D2GluN/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-23 15:02:17.966; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-D2GluN/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-D2GluN/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-23 15:02:19.129; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 15:02:19.134; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-23 15:02:19.577; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@2a2da905[provider=null,keyStore=file:///tmp/bats-run-D2GluN/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-D2GluN/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-23 15:02:19.579; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@2a2da905[provider=null,keyStore=file:///tmp/bats-run-D2GluN/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-D2GluN/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10640ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 43167 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43167 (pid=6690). Happy searching!
#
#     INFO  - 2023-10-23 15:02:26.890; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 15:02:26.894; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-23 15:02:29.198; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 15:02:29.204; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13809ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-23 15:02:38.483; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-23 15:02:42.260; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-23 15:02:43.751; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 62 start solr with mTLS needed in 67169ms
not ok 63 start solr with mTLS wanted in 38328ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 475)
#   `assert_output --partial "Created collection 'test'"' failed
# /tmp/bats-run-D2GluN/test/63/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 43167 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43167 (pid=10529). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 43168 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43168 (pid=10638). Happy searching!
#
#     INFO  - 2023-10-23 15:04:15.448; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 15:04:15.458; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-23 15:04:16.384; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-D2GluN/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D2GluN/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-23 15:04:16.386; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-D2GluN/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D2GluN/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-23 15:04:16.387; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(ca,h=[localhost],a=[],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-D2GluN/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D2GluN/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-23 15:04:16.426 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F D4 FC 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 15:04:03.000 UTC",
#     "not  after"         : "2024-01-21 15:04:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 9E D4 02 31 8F CF B7   58 CF 81 C9 AC CC DA 99  ....1...X.......
#         0010: CD 2B A1 6E                                        .+.n
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F F3 3F 92 B2 D6 20 15   B9 5A 88 A1 2E 7E E4 79  ..?... ..Z.....y
#         0010: 29 56 DD 02                                        )V..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 15:04:16.430 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 30 DA F0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 15:03:56.000 UTC",
#     "not  after"         : "2024-01-21 15:03:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 C2 B5 57 0F B2 41 74   BB F9 27 10 8B 71 3B E0  ...W..At..'..q;.
#         0010: 20 13 71 95                                         .q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 9E D4 02 31 8F CF B7   58 CF 81 C9 AC CC DA 99  ....1...X.......
#         0010: CD 2B A1 6E                                        .+.n
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A 2C D9 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 15:03:54.000 UTC",
#     "not  after"         : "2024-01-21 15:03:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 C2 B5 57 0F B2 41 74   BB F9 27 10 8B 71 3B E0  ...W..At..'..q;.
#         0010: 20 13 71 95                                         .q.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 15:04:16.442 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 15:04:16.589 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 15:04:16.590 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 15:04:16.590 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 15:04:16.590 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-23 15:04:16.601 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 15:04:16.601 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-23 15:04:16.603 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-23 15:04:16.603 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 15:04:16.614 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 15:04:16.632 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 15:04:16.632 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 15:04:16.633 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 15:04:16.638 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2F 3F DF DF A3 D4 3B BC A5 08 BC 46 EC 21 B5 BD 06 C7 7B 0F F6 60 2D AF D5 89 8B B9 26 C3 32 8A",
#   "session id"          : "0C 7C 5E EA A9 68 D2 FA 8B 48 DA 9F 36 04 28 CA CC CC 41 6B DD 15 63 5F F3 81 22 B1 54 0B CC 9C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8B 27 63 33 61 E5 65 A7   93 6A 3B 34 C8 6A 66 CC  .'c3a.e..j;4.jf.
#             0010: 42 9D FB 8B 96 87 29 5E   75 B7 BA E6 80 6A 88 4D  B.....)^u....j.M
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.719 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "72 46 8A CD E9 DF B9 24 F8 11 79 30 DF 9A 99 94 75 42 33 4D F4 2C 43 05 C4 34 4F 90 30 40 3E C0",
#   "session id"          : "0C 7C 5E EA A9 68 D2 FA 8B 48 DA 9F 36 04 28 CA CC CC 41 6B DD 15 63 5F F3 81 22 B1 54 0B CC 9C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A8 75 4F 60 BF BD FD C4   37 55 2E 9E F8 27 BD 92  .uO`....7U...'..
#           0010: CC 1B 79 DE 6B BF 6D A8   8F E5 CE C3 57 FB C1 5F  ..y.k.m.....W.._
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.723 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.723 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.725 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.736 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.739 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.739 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.740 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 15:04:16.743 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 15:04:16.743 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.743 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.743 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.767 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.769 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.772 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.780 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.780 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.780 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.780 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.780 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.780 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.780 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 15:04:16.780 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 15:04:16.780 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.781 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.782 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.785 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.785 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.786 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.792 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 15:04:16.792 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.798 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 52 15 94",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 15:03:59.000 UTC",
#       "not  after"         : "2024-01-21 15:03:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 9E D4 02 31 8F CF B7   58 CF 81 C9 AC CC DA 99  ....1...X.......
#           0010: CD 2B A1 6E                                        .+.n
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6A B9 A0 85 63 B9 48 10   98 24 AB B4 BB 57 AD 31  j...c.H..$...W.1
#           0010: 41 CB 09 57                                        A..W
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:16.798 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:17.065 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 30 DA F0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 15:03:56.000 UTC",
#     "not  after"         : "2024-01-21 15:03:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 C2 B5 57 0F B2 41 74   BB F9 27 10 8B 71 3B E0  ...W..At..'..q;.
#         0010: 20 13 71 95                                         .q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 9E D4 02 31 8F CF B7   58 CF 81 C9 AC CC DA 99  ....1...X.......
#         0010: CD 2B A1 6E                                        .+.n
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 15:04:17.069 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2A C7 D7 70 36 BD E8 C9   E9 9C F0 ED 22 EC CB 8F  *..p6......."...
#     0010: 98 79 70 F1 53 9D 9E A8   4B 70 9E 00 08 06 7B 13  .yp.S...Kp......
#     0020: 87 2A 16 C7 67 62 1C 42   50 D3 8F 49 17 F8 68 7D  .*..gb.BP..I..h.
#     0030: D5 DA 57 03 57 6A FD 0A   44 5B 70 5D B6 AD BB FE  ..W.Wj..D[p]....
#     0040: DD 58 B3 6B 72 0C FB 4F   69 3D 71 8F A5 56 3A 8D  .X.kr..Oi=q..V:.
#     0050: 21 1F 28 AB 04 4D F9 D3   6E 43 D6 D2 36 EF 62 2C  !.(..M..nC..6.b,
#     0060: FC 14 C0 D2 A6 ED 96 BC   30 DC D5 18 35 34 6B 8D  ........0...54k.
#     0070: 01 E4 3B 74 17 3B 9A B8   92 96 32 C3 D3 2F E4 6C  ..;t.;....2../.l
#     0080: 4A 65 A3 D6 B6 06 02 56   A8 2E 89 F2 22 50 5F E0  Je.....V...."P_.
#     0090: 9B 46 F4 68 40 02 74 25   F6 57 54 B1 3B 6C 05 53  .F.h@.t%.WT.;l.S
#     00A0: E8 B0 7B 26 36 3D 65 4E   BC 9F F8 39 3E 28 5A 4A  ...&6=eN...9>(ZJ

[...truncated too long message...]

X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 30 DA F0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 15:03:56.000 UTC",
#     "not  after"         : "2024-01-21 15:03:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 C2 B5 57 0F B2 41 74   BB F9 27 10 8B 71 3B E0  ...W..At..'..q;.
#         0010: 20 13 71 95                                         .q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 9E D4 02 31 8F CF B7   58 CF 81 C9 AC CC DA 99  ....1...X.......
#         0010: CD 2B A1 6E                                        .+.n
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A 2C D9 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 15:03:54.000 UTC",
#     "not  after"         : "2024-01-21 15:03:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 C2 B5 57 0F B2 41 74   BB F9 27 10 8B 71 3B E0  ...W..At..'..q;.
#         0010: 20 13 71 95                                         .q.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 15:04:25.324 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 15:04:25.422 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 15:04:25.422 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 15:04:25.422 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 15:04:25.423 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14197ms
ok 65 stop command for single port in 17796ms
not ok 66 status detects locally running solr in 2623ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 729 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 14041 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 729 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 14041 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 251ms
ok 68 listing out files in 2842ms
ok 69 copying files around in 14247ms
ok 70 upconfig in 2847ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1239ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1231ms
not ok 73 Cleanup in 3713ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 729 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 14041 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 729 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 14041 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 21s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/l7gql4afc24gs

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 877 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/877/

All tests passed

Build Log:
[...truncated 1170 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196528ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 5761ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-23 05:46:58.472; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:47:00.731; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1277ms
not ok 8 accept d option with builtin config in 2398ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-23 05:47:04.421; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:47:04.470; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2398ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-23 05:47:06.843; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:47:06.895; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 4627ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-23 05:47:09.294; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:47:11.550; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2398ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-23 05:47:13.905; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:47:13.973; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 3789ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-23 05:47:16.499; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:47:17.684; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 5955ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-23 05:47:20.379; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:47:23.762; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 5122ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-23 05:47:34.703; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:47:34.774; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 3396ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-23 05:47:38.116; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:47:38.192; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 3316ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-23 05:47:41.399; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:47:41.476; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2983ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-23 05:47:44.498; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:47:44.557; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 32984ms
ok 19 Check export command in 24455ms
ok 20 export fails on non cloud mode in 8739ms
not ok 21 using curl to extract a single pdf file in 12405ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 46269 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46269 (pid=22002). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-23 05:49:00.020; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:49:03.379; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 13944ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 46269 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46269 (pid=22482). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-23 05:49:11.790; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:49:17.350; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8726ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 46269 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46269 (pid=22968). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-23 05:49:26.068; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:49:26.118; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30371ms
ok 25 start help flag prints help in 187ms
ok 26 stop help flag prints help in 167ms
ok 27 restart help flag prints help in 170ms
ok 28 status help flag prints help in 55ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 162ms
ok 30 create help flag prints help in 171ms
ok 31 createcore help flag prints help in 167ms
ok 32 createcollection help flag prints help in 166ms
ok 33 delete help flag prints help in 167ms
ok 34 version help flag prints help in 53ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 168ms
ok 36 auth help flag prints help in 177ms
ok 37 assert help flag prints help in 1025ms
ok 38 post help flag prints help in 982ms
not ok 39 SQL Module in 11315ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:46269/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-23 05:50:10.935; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:50:12.106; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:46269/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19041ms
not ok 41 icu collation in analysis-extras module in 9751ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-23 05:50:39.820; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:50:40.980; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1303ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 4 Solr nodes:
#
#   Solr process 729 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 4 Solr nodes:
#
# Solr process 729 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9878ms
not ok 44 deploying and undeploying a collection level package in 196320ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 46269 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46269 (pid=27104). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 18291ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-23 05:54:19.222; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:54:23.680; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-23 05:54:24.682; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:54:26.956; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 11213ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-23 05:54:37.069; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:54:37.122; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-23 05:54:38.155; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:54:38.210; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3927ms
not ok 48 basic post with a type specified in 1359ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1247ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1196ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1235ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1375ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1374ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1354ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 3830ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-23 05:55:05.825; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:55:05.880; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 3569ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-23 05:55:08.337; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:55:09.493; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 14289ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:46269/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-9Bcdk0%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-23 05:55:19.420; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 05:55:23.877; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:46269/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-9Bcdk0%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12510ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 46269 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46269 (pid=1151). Happy searching!
#
#     INFO  - 2023-10-23 05:55:31.311; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 05:55:31.315; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-23 05:55:31.709; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-9Bcdk0/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9Bcdk0/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-23 05:55:34.592; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-23 05:55:34.596; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-23 05:55:36.162; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 05:55:36.166; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12229ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 46269 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46269 (pid=1800). Happy searching!
#
#     INFO  - 2023-10-23 05:55:43.657; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 05:55:43.662; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-23 05:55:44.010; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-9Bcdk0/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9Bcdk0/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-23 05:55:44.108; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-9Bcdk0/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9Bcdk0/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-23 05:55:44.108; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-9Bcdk0/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9Bcdk0/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-23 05:55:46.855; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-23 05:55:46.859; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-23 05:55:47.298; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@54107f42[provider=null,keyStore=file:///tmp/bats-run-9Bcdk0/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9Bcdk0/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-23 05:55:47.299; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@54107f42[provider=null,keyStore=file:///tmp/bats-run-9Bcdk0/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9Bcdk0/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-23 05:55:48.454; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 05:55:48.459; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-23 05:55:48.886; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@1b11ef33[provider=null,keyStore=file:///tmp/bats-run-9Bcdk0/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9Bcdk0/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-23 05:55:48.887; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@1b11ef33[provider=null,keyStore=file:///tmp/bats-run-9Bcdk0/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9Bcdk0/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10602ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 46269 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46269 (pid=2355). Happy searching!
#
#     INFO  - 2023-10-23 05:55:56.002; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 05:55:56.006; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-23 05:55:58.808; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 05:55:58.814; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 14349ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-23 05:56:07.818; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-23 05:56:11.720; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-23 05:56:13.363; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 41160ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-9Bcdk0/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 46269 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46269 (pid=3995). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 46270 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 46270 (pid=4108). Happy searching!
#
#     INFO  - 2023-10-23 05:56:38.545; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 05:56:38.550; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-23 05:56:39.463; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2c1b9e4b(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-9Bcdk0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9Bcdk0/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-23 05:56:39.475; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-9Bcdk0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9Bcdk0/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-23 05:56:39.484; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(ca,h=[localhost],a=[],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-9Bcdk0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9Bcdk0/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-23 05:56:39.769 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "07 86 B2 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 05:56:25.000 UTC",
#     "not  after"         : "2024-01-21 05:56:25.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D7 93 A2 AE D1 4C CD F0   BC 82 58 AC DB C1 9E 3E  .....L....X....>
#         0010: 56 3B 99 27                                        V;.'
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 00 C4 67 06 7D 3F 82 43   0D 55 F4 A6 0A 2D 6F ED  ..g..?.C.U...-o.
#         0010: 32 81 72 6F                                        2.ro
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 3E 9E 63",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 05:56:19.000 UTC",
#     "not  after"         : "2024-01-21 05:56:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 84 2E 73 DE 5E 11 41   10 8D 50 A9 41 C0 FC F4  u..s.^.A..P.A...
#         0010: 82 E9 5F BC                                        .._.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D7 93 A2 AE D1 4C CD F0   BC 82 58 AC DB C1 9E 3E  .....L....X....>
#         0010: 56 3B 99 27                                        V;.'
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 05:56:39.773 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 4A 97 BC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 05:56:16.000 UTC",
#     "not  after"         : "2024-01-21 05:56:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 84 2E 73 DE 5E 11 41   10 8D 50 A9 41 C0 FC F4  u..s.^.A..P.A...
#         0010: 82 E9 5F BC                                        .._.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 3E 9E 63",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 05:56:19.000 UTC",
#     "not  after"         : "2024-01-21 05:56:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 84 2E 73 DE 5E 11 41   10 8D 50 A9 41 C0 FC F4  u..s.^.A..P.A...
#         0010: 82 E9 5F BC                                        .._.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D7 93 A2 AE D1 4C CD F0   BC 82 58 AC DB C1 9E 3E  .....L....X....>
#         0010: 56 3B 99 27                                        V;.'
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 05:56:39.787 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-23 05:56:40.263 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 05:56:40.263 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-23 05:56:40.264 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-23 05:56:40.265 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 05:56:40.271 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 05:56:40.282 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 05:56:40.282 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 05:56:40.282 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-23 05:56:40.284 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "60 77 5A F3 E7 08 6F 42 B7 2E BE 85 38 71 FC E2 3A F6 8D 20 EB 3A A5 C1 DF 6F EA AC 38 42 BA 73",
#   "session id"          : "A0 18 7D DF B7 FE 51 E3 B5 E4 6C A3 CD 98 30 73 71 31 34 1F 80 E7 28 8A E8 F7 F5 14 81 10 A5 26",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E1 18 8E 85 80 EF 1F 4A   C1 E9 D1 FC 2A 1B EB E5  .......J....*...
#             0010: 82 5D 8F 08 58 FF 02 15   5E 69 EF D0 B8 D8 D2 5E  .]..X...^i.....^
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.424 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "14 7D 39 C9 D4 8D C2 C3 7B 79 17 04 7B 2E 56 05 45 2B AA 49 4F E0 39 A0 B9 2A B5 A2 79 92 D8 A0",
#   "session id"          : "A0 18 7D DF B7 FE 51 E3 B5 E4 6C A3 CD 98 30 73 71 31 34 1F 80 E7 28 8A E8 F7 F5 14 81 10 A5 26",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 92 7A 23 02 F9 5F 86 09   56 0C 25 31 DF E3 B9 A0  .z#.._..V.%1....
#           0010: C4 D7 49 44 E5 D1 DB 6C   F1 1A DC 18 42 92 C5 62  ..ID...l....B..b
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.424 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.424 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.431 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.431 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.431 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.431 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.432 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.432 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.432 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.432 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.440 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.440 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 05:56:40.441 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 05:56:40.441 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.454 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.455 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.456 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.459 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.459 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.459 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.459 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.460 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.460 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.460 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 05:56:40.460 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 05:56:40.460 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.472 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.472 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.472 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.474 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.475 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.476 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-23 05:56:40.476 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.483 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B 46 92 21",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 05:56:21.000 UTC",
#       "not  after"         : "2024-01-21 05:56:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D7 93 A2 AE D1 4C CD F0   BC 82 58 AC DB C1 9E 3E  .....L....X....>
#           0010: 56 3B 99 27                                        V;.'
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 13 9F E3 FF C0 FE 95 E7   FF AD CF 59 7F 3D 65 80  ...........Y.=e.
#           0010: 14 3A F7 A4                                        .:..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.483 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-23 05:56:40.675 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 3E 9E 63",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 05:56:19.000 UTC",
#     "not  after"         : "2024-01-21 05:56:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 84 2E 73 DE 5E 11 41   10 8D 50 A9 41 C0 FC F4  u..s.^.A..P.A...
#         0010: 82 E9 5F BC                                        .._.
#         ]
#         ]
#       },
#       {
#         ObjectId: 

[...truncated too long message...]

tate, C=Country",
#     "not before"         : "2023-10-23 05:56:58.000 UTC",
#     "not  after"         : "2024-01-21 05:56:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 3D 52 2C D2 36 B8 11   AB 7C 40 06 D7 7E 1F 40  ==R,.6....@....@
#         0010: 86 9C 39 4C                                        ..9L
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4A FD AE 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 05:57:00.000 UTC",
#     "not  after"         : "2024-01-21 05:57:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 3D 52 2C D2 36 B8 11   AB 7C 40 06 D7 7E 1F 40  ==R,.6....@....@
#         0010: 86 9C 39 4C                                        ..9L
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 01 EF 97 68 D0 A3 B9   86 CB 18 AA 36 C4 60 78  -...h.......6.`x
#         0010: DE 52 6B 76                                        .Rkv
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 05:57:28.639 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14715ms
ok 65 stop command for single port in 17248ms
not ok 66 status detects locally running solr in 4835ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (17 lines):
#
#   Found 4 Solr nodes:
#
#   Solr process 729 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20025 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 19601 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 14041 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 4 Solr nodes:
#
# Solr process 729 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20025 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 19601 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 14041 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 237ms
ok 68 listing out files in 2772ms
ok 69 copying files around in 10987ms
ok 70 upconfig in 8262ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1221ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1238ms
not ok 73 Cleanup in 5812ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (17 lines):
#
#   Found 4 Solr nodes:
#
#   Solr process 729 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20025 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 19601 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 14041 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 4 Solr nodes:
#
# Solr process 729 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20025 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 19601 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 14041 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 6m 5s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/7s42hdudihboo

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 876 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/876/

All tests passed

Build Log:
[...truncated 1202 lines...]
#   ERROR: Error from server at http://localhost:38737/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-22 23:00:12.075; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 23:00:12.131; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:38737/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 21384ms
ok 41 icu collation in analysis-extras module in 13685ms
not ok 42 package detects no running solr in 1320ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 20025 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 20025 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9941ms
ok 44 deploying and undeploying a collection level package in 13482ms
ok 45 Affinity placement plugin using sysprop in 22625ms
ok 46 Random placement plugin using ENV in 17844ms
ok 47 Check help command in 3882ms
ok 48 basic post with a type specified in 5616ms
ok 49 basic post WITHOUT a type specified in 12127ms
ok 50 crawling a directory in 4553ms
ok 51 crawling a web site in 4720ms
ok 52 commit and optimize and delete in 4041ms
ok 53 args mode in 6535ms
ok 54 stdin mode in 3440ms
ok 55 post solr log into solr via script in 10829ms
ok 56 post solr log into solr via cli in 7237ms
ok 57 allowPaths - backup in 17279ms
not ok 58 start solr with ssl in 12613ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 38737 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38737 (pid=10269). Happy searching!
#
#     INFO  - 2023-10-22 23:03:31.443; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 23:03:31.447; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-22 23:03:31.949; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-dIeQGD/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-dIeQGD/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-22 23:03:34.646; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-22 23:03:34.651; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-22 23:03:36.181; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 23:03:36.186; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12822ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 38737 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38737 (pid=10865). Happy searching!
#
#     INFO  - 2023-10-22 23:03:43.930; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 23:03:43.934; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-22 23:03:44.299; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-dIeQGD/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-dIeQGD/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-22 23:03:44.397; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-dIeQGD/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-dIeQGD/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-22 23:03:44.401; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-dIeQGD/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-dIeQGD/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-22 23:03:47.568; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-22 23:03:47.572; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-22 23:03:47.977; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@53499d85[provider=null,keyStore=file:///tmp/bats-run-dIeQGD/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-dIeQGD/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-22 23:03:47.979; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@53499d85[provider=null,keyStore=file:///tmp/bats-run-dIeQGD/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-dIeQGD/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-22 23:03:49.069; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 23:03:49.073; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-22 23:03:49.481; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-dIeQGD/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-dIeQGD/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-22 23:03:49.482; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-dIeQGD/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-dIeQGD/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10496ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 38737 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38737 (pid=11412). Happy searching!
#
#     INFO  - 2023-10-22 23:03:56.619; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 23:03:56.623; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-22 23:03:59.588; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 23:03:59.593; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13619ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-22 23:04:08.358; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-22 23:04:11.714; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-22 23:04:13.299; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 37653ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-dIeQGD/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 38737 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38737 (pid=13040). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 38738 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38738 (pid=13149). Happy searching!
#
#     INFO  - 2023-10-22 23:04:38.844; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 23:04:38.851; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-22 23:04:39.772; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-dIeQGD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dIeQGD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 23:04:39.774; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-dIeQGD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dIeQGD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 23:04:39.775; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(ca,h=[localhost],a=[],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-dIeQGD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dIeQGD/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-22 23:04:39.836 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 27 C9 87",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 23:04:25.000 UTC",
#     "not  after"         : "2024-01-20 23:04:25.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 49 83 5D 02 99 AB 3F   7E 01 3A F7 B4 69 94 98  .I.]...?..:..i..
#         0010: FC 74 10 73                                        .t.s
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 92 8E 91 7C EC 7B 34 AF   DE 2C 97 A8 3E DD 16 91  ......4..,..>...
#         0010: 73 1E E1 C6                                        s...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 91 CE 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 23:04:18.000 UTC",
#     "not  after"         : "2024-01-20 23:04:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 4E BE 0E EA A1 6B 2A   C5 16 DE 55 C5 6D DA 29  .N....k*...U.m.)
#         0010: 89 A2 81 37                                        ...7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 49 83 5D 02 99 AB 3F   7E 01 3A F7 B4 69 94 98  .I.]...?..:..i..
#         0010: FC 74 10 73                                        .t.s
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 23:04:39.843 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 6F E6 2F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 23:04:16.000 UTC",
#     "not  after"         : "2024-01-20 23:04:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 4E BE 0E EA A1 6B 2A   C5 16 DE 55 C5 6D DA 29  .N....k*...U.m.)
#         0010: 89 A2 81 37                                        ...7
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 91 CE 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 23:04:18.000 UTC",
#     "not  after"         : "2024-01-20 23:04:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 4E BE 0E EA A1 6B 2A   C5 16 DE 55 C5 6D DA 29  .N....k*...U.m.)
#         0010: 89 A2 81 37                                        ...7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 49 83 5D 02 99 AB 3F   7E 01 3A F7 B4 69 94 98  .I.]...?..:..i..
#         0010: FC 74 10 73                                        .t.s
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 23:04:39.866 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 23:04:40.372 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 23:04:40.372 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 23:04:40.372 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 23:04:40.373 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 23:04:40.435 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 23:04:40.435 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 23:04:40.437 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 23:04:40.437 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 23:04:40.442 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 23:04:40.457 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 23:04:40.457 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 23:04:40.457 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 23:04:40.459 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7A 1A 1D 27 73 1B D3 F5 9C 39 96 6F 9A D3 3E E6 89 02 79 08 4A E4 0D 3F 2A 33 52 D1 F2 39 14 F5",
#   "session id"          : "9A 58 38 AD 43 9D 6B 27 5B 72 A5 D5 36 CC 9E F8 B0 86 D3 E0 A3 39 EA 30 55 E3 C3 F9 0A BC A0 CD",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: AF 1D 7E 25 CA 57 F7 BB   2A BD A5 A7 E3 90 29 A4  ...%.W..*.....).
#             0010: CE 8B 0A DF CA 59 07 0E   A4 9D 2F C0 6F 44 C7 08  .....Y..../.oD..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.591 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "67 31 AE C2 3F F2 76 6F C3 8A 3A 02 C2 9A FC AA 7B F7 DD 18 29 06 E6 A2 CD 4F 9C 27 8E 29 AE 7A",
#   "session id"          : "9A 58 38 AD 43 9D 6B 27 5B 72 A5 D5 36 CC 9E F8 B0 86 D3 E0 A3 39 EA 30 55 E3 C3 F9 0A BC A0 CD",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 0C BC 66 EE A9 BA FA B1   D3 0F BC FA C1 8B 59 E7  ..f...........Y.
#           0010: 09 B7 AD 50 DE E2 72 BD   D7 AD 3A C6 49 B5 D3 12  ...P..r...:.I...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.591 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.591 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.593 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.593 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.593 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.593 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.593 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.593 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.593 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.594 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.603 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.604 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.608 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 23:04:40.608 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 23:04:40.608 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.609 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.631 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.634 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.635 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.640 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.640 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.640 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.640 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.640 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.644 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.644 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 23:04:40.646 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 23:04:40.646 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.647 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.647 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.647 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.648 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.648 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.649 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 23:04:40.649 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.651 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 AD 33 89",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 23:04:21.000 UTC",
#       "not  after"         : "2024-01-20 23:04:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 49 83 5D 02 99 AB 3F   7E 01 3A F7 B4 69 94 98  .I.]...?..:..i..
#           0010: FC 74 10 73                                        .t.s
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 33 70 9D 2A B3 19 3C   2F 08 67 40 B5 E5 5F C3  u3p.*..</.g@.._.
#           0010: 23 89 FD 9A                                        #...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:40.652 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:41.105 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 91 CE 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 23:04:18.000 UTC",
#     "not  after"         : "2024-01-20 23:04:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 4E BE 0E EA A1 6B 2A   C5 16 DE 55 C5 6D DA 29  .N....k*...U.m.)
#         0010: 89 A2 81 37                                        ...7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 49 83 5D 02 99 AB 3F   7E 01 3A F7 B4 69 94 98  .I.]...?..:..i..
#         0010: FC 74 10 73                                        .t.s
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:41.118 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 52 71 25 0A 0F B4 8B DA   09 99 13 8B 6B 33 3F CF  Rq%.........k3?.
#     0010: 0F 00 36 29 25 81 D9 D1   BB 2A 3F 61 D6 F4 C4 CF  ..6)%....*?a....
#     0020: 95 FF 86 36 F8 E8 67 14   4A 59 C7 D1 FF A6 AC F1  ...6..g.JY......
#     0030: BE E2 B9 35 25 63 81 C1   4E C5 80 D3 52 0B 8D 4C  ...5%c..N...R..L
#     0040: 9B 77 FA 65 AB 8F 25 5C   2B B4 7E EA B0 46 98 44  .w.e..%\+....F.D
#     0050: 99 0D C0 3E 79 62 4A 5D   F9 9A A3 9B 65 54 7D E2  ...>ybJ]....eT..
#     0060: 35 6C 4D 2C ED 18 EE 8C   CF 7C 12 F1 1B E9 1C A2  5lM,............
#     0070: 4D B0 6C 6B BA 81 9C AB   D0 33 25 0A 9E 44 8C 51  M.lk.....3%..D.Q
#     0080: 1F B4 D7 95 B3 DD B5 9C   60 0D 4E 81 E0 BF 67 63  ........`.N...gc
#     0090: 74 DB B0 0D 30 8D FD 97   D1 D7 64 B5 D7 48 29 98  t...0.....d..H).
#     00A0: 46 40 A7 9B 21 E4 30 DB   E3 C2 B8 91 F0 EF 96 32  F@..!.0........2
#     00B0: 30 16 97 C1 F8 B1 99 DA   3B 1D F2 25 D6 C2 E7 73  0.......;..%...s
#     00C0: AF 70 22 CA B7 03 4D FF   4C 3D BE F9 98 42 AE 34  .p"...M.L=...B.4
#     00D0: 52 1F 6D 74 B7 83 C8 7D   99 F6 8C EB 5D 13 96 2F  R.mt........]../
#     00E0: AF DC 9D 60 D0 FB 79 39   4C F4 CE 7C 27 29 C1 58  ...`..y9L...').X
#     00F0: B6 D7 83 CF C7 78 D1 34   CD 5A F3 47 13 A4 F2 C3  .....x.4.Z.G....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:41.130 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 29 E2 96 0A 7B 41 06 00   64 C0 3A D5 16 92 81 E1  )....A..d.:.....
#     0010: 42 F4 39 8A E6 EF CD 85   E3 95 A0 4A 2F 65 96 FE  B.9........J/e..
#     0020: 2B 85 22 07 60 7F FE 0D   D4 1C 01 AB A9 D5 40 CD  +.".`.........@.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:41.133 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 23:04:41.134 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 23:04:41.134 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 23:04:41.135 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 23:04:41.135 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 23:04:41.137 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 23:04:41.139 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:41.141 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:41.143 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B 27 C9 87",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 23:04:25.000 UTC",
#       "not  after"         : "2024-01-20 23:04:25.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 49 83 5D 02 99 AB 3F   7E 01 3A F7 B4 69 94 98  .I.]...?..:..i..
#           0010: FC 74 10 73                                        .t.s
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 92 8E 91 7C EC 7B 34 AF   DE 2C 97 A8 3E DD 16 91  ......4..,..>...
#           0010: 73 1E E1 C6                                        s...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 91 CE 0D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 23:04:18.000 UTC",
#       "not  after"         : "2024-01-20 23:04:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 4E BE 0E EA A1 6B 2A   C5 16 DE 55 C5 6D DA 29  .N....k*...U.m.)
#           0010: 89 A2 81 37                                        ...7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 49 83 5D 02 99 AB 3F   7E 01 3A F7 B4 69 94 98  .I.]...?..:..i..
#           0010: FC 74 10 73                                        .t.s
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:41.194 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6F 8D 0E 8F 0E D9 DE 4C   44 C7 B8 71 3E 61 8E 49  o......LD..q>a.I
#     0010: 2A 4A 21 1D 75 57 5A EA   E8 71 FC 44 43 36 E4 75  *J!.uWZ..q.DC6.u
#     0020: 63 BF 77 3B 6C A1 67 92   88 8A 8A D5 C3 0F 92 9D  c.w;l.g.........
#     0030: 10 C1 23 ED A5 C1 77 5D   A9 A7 FC FC 80 B6 5B 32  ..#...w]......[2
#     0040: EF 97 CB 6E 57 A3 9B 8F   31 F2 BC E0 2D F4 94 07  ...nW...1...-...
#     0050: 84 BB 25 50 74 99 AB 9E   0D 45 6E 59 D7 EE 89 17  ..%Pt....EnY....
#     0060: 91 A4 2D 85 B7 8D 4F 52   E1 68 5F 5E 88 70 F4 24  ..-...OR.h_^.p.$
#     0070: 7C A5 51 A8 15 0A C7 9C   EA 77 4C 7C 72 C3 DD 21  ..Q......wL.r..!
#     0080: 2A F4 0C DB 58 A0 DD 77   64 46 75 75 8E 5E 07 AE  *...X..wdFuu.^..
#     0090: 87 8F FE 36 FB 5B 72 AD   C4 29 2A 90 79 C5 09 FC  ...6.[r..)*.y...
#     00A0: C3 5B 91 08 25 13 7D 15   43 7D 07 80 DD BA 23 14  .[..%...C.....#.
#     00B0: 1A 41 A1 54 22 EF 56 26   98 92 C5 F3 FB 5C 6C AD  .A.T".V&.....\l.
#     00C0: 11 A4 5D 33 3E A2 53 51   EC 0F ED 29 9E 1A EE 57  ..]3>.SQ...)...W
#     00D0: 35 7C A1 A5 E5 19 4E F0   54 92 C4 5A 9D B6 3A 47  5.....N.T..Z..:G
#     00E0: FD E2 BC 0F 5E FD C8 12   72 88 EE 7F C3 65 A7 4F  ....^...r....e.O
#     00F0: DD 55 32 C9 84 E2 F9 62   AE C6 4A 90 78 BD 18 08  .U2....b..J.x...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:41.195 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4F D0 FC 1D EA 26 70 BC   3B 68 BD 30 CB 0F AE F0  O....&p.;h.0....
#     0010: B0 05 9A AE 80 C7 92 0F   D6 57 D7 41 17 AC 23 8D  .........W.A..#.
#     0020: ED 3E B5 69 E5 71 FE 2B   4A F3 7A 2E 72 B6 10 17  .>.i.q.+J.z.r...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:41.196 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:41.300 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5A 9E 8E B4 93 20 D1 75 C5 24 E7 A6 44 3A 26 A0 A3 2C 86 7D 62 29 4F 42 E0 67 46 A1 3F 46 AA 7D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-22 23:04:42.156 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-22 23:04:42.165 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-22 23:04:43.823; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 23:04:43.827; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-22 23:04:44.212; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@743cb8e0(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-dIeQGD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dIeQGD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 23:04:44.214; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-dIeQGD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dIeQGD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 23:04:44.214; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(ca,h=[localhost],a=[],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-dIeQGD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dIeQGD/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-22 23:04:44.255 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 27 C9 87",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 23:04:25.000 UTC",
#     "not  after"         : "2024-01-20 23:04:25.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 49 83 5D 02 99 AB 3F   7E 01 3A F7 B4 69 94 98  .I.]...?..:..i..
#         0010: FC 74 10 73                                        .t.s
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 92 8E 91 7C EC 7B 34 AF   DE 2C 97 A8 3E DD 16 91  ......4..,..>...
#         0010: 73 1E E1 C6                                        s...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 91 CE 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 23:04:18.000 UTC",
#     "not  after"         : "2024-01-20 23:04:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 4E BE 0E EA A1 6B 2A   C5 16 DE 55 C5 6D DA 29  .N....k*...U.m.)
#         0010: 89 A2 81 37                                        ...7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 49 83 5D 02 99 AB 3F   7E 01 3A F7 B4 69 94 98  .I.]...?..:..i..
#         0010: FC 74 10 73                                        .t.s
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 23:04:44.258 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 6F E6 2F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 23:04:16.000 UTC",
#     "not  after"         : "2024-01-20 23:04:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 4E BE 0E EA A1 6B 2A   C5 16 DE 55 C5 6D DA 29  .N....k*...U.m.)
#         0010: 89 A2 81 37                                        ...7
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 91 CE 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 23:04:18.000 UTC",
#     "not  after"         : "2024-01-20 23:04:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 4E BE 0E EA A1 6B 2A   C5 16 DE 55 C5 6D DA 29  .N....k*...U.m.)
#         0010: 89 A2 81 37                                        ...7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 49 83 5D 02 99 AB 3F   7E 01 3A F7 B4 69 94 98  .I.]...?..:..i..
#         0010: FC 74 10 73                                        .t.s
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 23:04:44.270 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 23:04:44.448 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 23:04:44.448 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 23:04:44.449 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 23:04:44.450 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 23:04:44.454 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 23:04:44.465 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 23:04:44.465 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 23:04:44.465 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 23:04:44.467 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7A 38 4F 21 38 9E D3 6E B3 84 0D 64 15 05 68 A6 47 E0 51 64 CF 13 52 B0 8E E1 1B 6F 57 6B 2B E4",
#   "session id"          : "41 47 33 BB 8C 89 9F 06 CF 60 77 7C CD C6 1B 49 51 72 2B 4E 4A F2 F0 02 CD FD EA 69 3B CD 82 56",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A1 C6 B4 B7 38 A0 2D A1   C3 81 E8 5D 88 70 BE B0  ....8.-....].p..
#             0010: 6B A9 A4 18 6E 41 C2 6F   F0 E2 4C 1D B9 E2 D5 2D  k...nA.o..L....-
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.581 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9A 0C 1A 38 E8 D3 FE A2 F9 CB 65 3A 25 B7 C4 95 D7 EE 3B 1A 5D AF FA 4B 8A 16 E0 FA 67 4F 9E 34",
#   "session id"          : "41 47 33 BB 8C 89 9F 06 CF 60 77 7C CD C6 1B 49 51 72 2B 4E 4A F2 F0 02 CD FD EA 69 3B CD 82 56",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 2E 15 E7 15 CA C5 42 67   CD 88 25 91 F2 30 6D EB  ......Bg..%..0m.
#           0010: 77 E4 88 2D AF 27 F4 DE   C2 16 2D EF 66 C3 4E 4E  w..-.'....-.f.NN
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.581 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.582 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.582 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.582 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.582 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.582 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.583 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.583 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.583 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.583 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.586 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.586 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.586 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.586 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.586 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.586 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.587 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.587 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.587 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 23:04:44.587 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 23:04:44.587 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.587 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.587 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.601 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.602 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.603 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.606 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.606 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.606 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.606 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.607 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.607 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.607 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 23:04:44.607 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 23:04:44.607 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.608 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.609 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.609 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.609 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.610 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.610 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 23:04:44.610 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.613 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 AD 33 89",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 23:04:21.000 UTC",
#       "not  after"         : "2024-01-20 23:04:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 49 83 5D 02 99 AB 3F   7E 01 3A F7 B4 69 94 98  .I.]...?..:..i..
#           0010: FC 74 10 73                                        .t.s
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 33 70 9D 2A B3 19 3C   2F 08 67 40 B5 E5 5F C3  u3p.*..</.g@.._.
#           0010: 23 89 FD 9A                                        #...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.613 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 23:04:44.661 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 23:04:44.661 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 23:04:44.661 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 23:04:44.662 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.688 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 91 CE 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 23:04:18.000 UTC",
#     "not  after"         : "2024-01-20 23:04:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 4E BE 0E EA A1 6B 2A   C5 16 DE 55 C5 6D DA 29  .N....k*...U.m.)
#         0010: 89 A2 81 37                                        ...7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 49 83 5D 02 99 AB 3F   7E 01 3A F7 B4 69 94 98  .I.]...?..:..i..
#         0010: FC 74 10 73                                        .t.s
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.690 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 44 65 8A 1F 78 1A 9E C0   31 7D 07 AA F9 28 5A 02  De..x...1....(Z.
#     0010: 29 2D 12 83 B3 7C C1 D5   C0 FF A9 A2 16 58 4E C2  )-...........XN.
#     0020: 96 ED BC 5D FB 1E 81 82   E8 03 6C C3 1B D9 2D B3  ...]......l...-.
#     0030: 01 F7 5C A3 5C 93 3E 20   C0 46 6D 39 F6 3F 6C B1  ..\.\.> .Fm9.?l.
#     0040: FC 76 6A B3 B6 09 55 6B   44 29 C7 01 ED C5 FA 01  .vj...UkD)......
#     0050: F8 CB 02 51 7C 4B 96 55   FD 35 27 B6 56 0A 19 28  ...Q.K.U.5'.V..(
#     0060: 70 6A 26 52 8B 82 99 41   9F 7B BE C2 3C 89 05 03  pj&R...A....<...
#     0070: 6A 3E 51 0B 91 B2 17 56   B1 BA 02 D8 32 A3 72 AC  j>Q....V....2.r.
#     0080: F7 8C E6 C1 A3 C0 23 5C   9A F9 ED 6F 3B EA 3F 38  ......#\...o;.?8
#     0090: F2 65 E9 46 FD E4 7D 25   2A 79 19 26 A5 A7 0C 6C  .e.F...%*y.&...l
#     00A0: 85 38 75 B9 FA CB 84 17   76 66 00 04 FC 62 31 D7  .8u.....vf...b1.
#     00B0: AA 2A 2D 3E 5C FF FE 66   EF DE 1F 66 94 66 A5 D0  .*->\..f...f.f..
#     00C0: A4 B5 44 2A 9B 86 53 06   D9 30 23 04 51 F3 68 ED  ..D*..S..0#.Q.h.
#     00D0: 77 B2 0F 0E D2 A2 59 85   8E DE 4F C9 DB 19 FC 14  w.....Y...O.....
#     00E0: 65 AE 5C 22 69 45 29 A6   31 1D A1 2D 8A 2A 54 C7  e.\"iE).1..-.*T.
#     00F0: 6F 65 33 C6 58 D8 A6 24   04 5D 72 40 A5 6A F4 3F  oe3.X..$.]r@.j.?
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 23:04:44.692 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 60 C4 82 D4 2C F3 1D 9C   7D A2 9B 5F A1 70 30 93  `...,......_.p0.
#     0010: 74 79 6B A6 9D 1A 7E 66   9D 5A 08 2C 22 DD E9 2E  tyk....f.Z.,"...
#     0020: 0B 0D 2A D8 BF BD 59 4D   53 A8 00 45 BA 84 68 6B  ..*...YMS..E..hk
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread

[...truncated too long message...]

t  after"         : "2024-01-20 23:04:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B0 A4 3B B3 BF B1 96 C6   C4 AF 62 BA 1F AA 1E DF  ..;.......b.....
#         0010: 7E C7 A3 46                                        ...F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 C5 BA 49 3F 65 D7 48   AC 26 C5 AF 7D 38 A1 62  ...I?e.H.&...8.b
#         0010: 23 C4 8E D5                                        #...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 43 3A D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 23:04:54.000 UTC",
#     "not  after"         : "2024-01-20 23:04:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B0 A4 3B B3 BF B1 96 C6   C4 AF 62 BA 1F AA 1E DF  ..;.......b.....
#         0010: 7E C7 A3 46                                        ...F
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 23:05:25.672 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 23:05:25.779 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 23:05:25.779 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 23:05:25.779 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 23:05:25.779 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14889ms
ok 65 stop command for single port in 17395ms
not ok 66 status detects locally running solr in 3713ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 20025 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 19601 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 14041 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 20025 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 19601 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 14041 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 244ms
ok 68 listing out files in 2820ms
ok 69 copying files around in 6412ms
ok 70 upconfig in 3839ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1224ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1223ms
not ok 73 Cleanup in 4648ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 20025 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 19601 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 14041 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 20025 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 19601 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 14041 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 6s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/hq2zpllgq2uz4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 875 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/875/

All tests passed

Build Log:
[...truncated 1179 lines...]
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-22 15:23:28.266; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 15:23:28.317; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 11362ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 36781 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36781 (pid=14909). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-22 15:23:37.035; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 15:23:39.652; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 9624ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 36781 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36781 (pid=15389). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-22 15:23:48.164; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 15:23:49.321; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30370ms
ok 25 start help flag prints help in 174ms
ok 26 stop help flag prints help in 178ms
ok 27 restart help flag prints help in 175ms
ok 28 status help flag prints help in 55ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 170ms
ok 30 create help flag prints help in 169ms
ok 31 createcore help flag prints help in 168ms
ok 32 createcollection help flag prints help in 172ms
ok 33 delete help flag prints help in 166ms
ok 34 version help flag prints help in 55ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 171ms
ok 36 auth help flag prints help in 179ms
ok 37 assert help flag prints help in 949ms
ok 38 post help flag prints help in 952ms
not ok 39 SQL Module in 10096ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:36781/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-22 15:24:34.004; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 15:24:34.060; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:36781/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 21758ms
not ok 41 icu collation in analysis-extras module in 14244ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-22 15:25:04.517; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 15:25:10.079; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1301ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 20025 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 20025 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10112ms
not ok 44 deploying and undeploying a collection level package in 196225ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 36781 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36781 (pid=19516). Happy searching!
#
#     
ok 45 Affinity placement plugin using sysprop in 20140ms
ok 46 Random placement plugin using ENV in 18187ms
ok 47 Check help command in 3755ms
ok 48 basic post with a type specified in 5412ms
ok 49 basic post WITHOUT a type specified in 11913ms
ok 50 crawling a directory in 4612ms
ok 51 crawling a web site in 4913ms
ok 52 commit and optimize and delete in 3983ms
ok 53 args mode in 6836ms
ok 54 stdin mode in 4037ms
ok 55 post solr log into solr via script in 10450ms
ok 56 post solr log into solr via cli in 8569ms
ok 57 allowPaths - backup in 15987ms
ok 58 start solr with ssl in 19163ms
ok 59 use different hostname when not checking peer-name in 30496ms
ok 60 start solr with ssl and auth in 16828ms
ok 61 start solr with client truststore and security manager in 19380ms
ok 62 start solr with mTLS needed in 63363ms
not ok 63 start solr with mTLS wanted in 37573ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 475)
#   `assert_output --partial "Created collection 'test'"' failed
# /tmp/bats-run-7Znqne/test/63/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 36781 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36781 (pid=1496). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 36782 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 36782 (pid=1627). Happy searching!
#
#     INFO  - 2023-10-22 15:33:41.233; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 15:33:41.244; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-22 15:33:41.984; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-7Znqne/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7Znqne/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 15:33:41.987; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-7Znqne/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7Znqne/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 15:33:41.987; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-7Znqne/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7Znqne/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-22 15:33:42.050 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C EF FB 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 15:33:28.000 UTC",
#     "not  after"         : "2024-01-20 15:33:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 56 B1 C6 CD 2E 80 E5   7A D3 07 68 C9 B6 37 17  .V......z..h..7.
#         0010: EF AC 4B 42                                        ..KB
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 ED 2C 45 AA 08 D3 12   A2 FE FA 12 17 8C E8 01  1.,E............
#         0010: 38 9A DE 65                                        8..e
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 15:33:42.065 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 D6 31 57",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 15:33:20.000 UTC",
#     "not  after"         : "2024-01-20 15:33:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 A0 EB 8B 1A F3 1A B0   AE 5C 52 34 CE 7A 54 B7  .........\R4.zT.
#         0010: BF A6 99 2F                                        .../
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E CD 0B 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 15:33:22.000 UTC",
#     "not  after"         : "2024-01-20 15:33:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 A0 EB 8B 1A F3 1A B0   AE 5C 52 34 CE 7A 54 B7  .........\R4.zT.
#         0010: BF A6 99 2F                                        .../
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 56 B1 C6 CD 2E 80 E5   7A D3 07 68 C9 B6 37 17  .V......z..h..7.
#         0010: EF AC 4B 42                                        ..KB
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 15:33:42.093 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 15:33:42.830 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 15:33:42.831 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 15:33:42.838 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 15:33:42.838 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 15:33:42.857 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 15:33:42.878 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 15:33:42.879 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 15:33:42.879 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 15:33:42.882 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "46 BB D7 98 6C EA E4 D4 9E A6 73 95 F3 87 61 17 EF EA C0 1D 84 A7 2B 26 44 A8 17 B4 0C F3 4F 8F",
#   "session id"          : "4B 3B 0C FB 0C 47 9B CA 6F 6D 65 8D 22 C2 6D B4 2A 69 66 73 16 72 55 CE 0B 1E 48 AF 0F 19 26 D9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7A 5C D2 73 26 BB 11 84   1D 6A 4B 07 9B F2 26 34  z\.s&....jK...&4
#             0010: 13 A7 6B 16 5B C0 4A 07   14 54 59 2F 10 1B 57 02  ..k.[.J..TY/..W.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.054 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "6B C8 8D D4 12 2A 1F C4 92 9F 7B E2 F5 2B 72 15 72 68 AA FE 1D B7 07 43 98 2F 52 9D 73 E9 7A AE",
#   "session id"          : "4B 3B 0C FB 0C 47 9B CA 6F 6D 65 8D 22 C2 6D B4 2A 69 66 73 16 72 55 CE 0B 1E 48 AF 0F 19 26 D9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 04 66 F2 A1 F9 A7 89 C4   C5 D2 78 D3 B7 30 D7 F2  .f........x..0..
#           0010: 0C 76 DB 59 CF 44 67 C9   04 31 02 9A 81 B0 BC 01  .v.Y.Dg..1......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.054 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.055 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.056 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.056 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.056 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.057 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.057 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.057 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.057 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.057 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.060 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.060 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.060 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.060 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.061 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.061 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.061 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.061 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.061 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.061 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:43.061 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:43.061 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.061 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.061 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.091 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.104 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.105 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.120 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.120 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.120 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.120 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.120 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.121 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:43.121 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:43.121 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.122 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.122 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.122 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.123 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.123 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.124 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:43.124 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.138 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 A5 BA 08",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 15:33:24.000 UTC",
#       "not  after"         : "2024-01-20 15:33:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 56 B1 C6 CD 2E 80 E5   7A D3 07 68 C9 B6 37 17  .V......z..h..7.
#           0010: EF AC 4B 42                                        ..KB
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 44 9E 31 53 B1 A5 07   17 AD FE F3 38 B4 AC EE  .D.1S.......8...
#           0010: 8F 29 C7 40                                        .).@
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.138 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.277 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E CD 0B 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 15:33:22.000 UTC",
#     "not  after"         : "2024-01-20 15:33:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 A0 EB 8B 1A F3 1A B0   AE 5C 52 34 CE 7A 54 B7  .........\R4.zT.
#         0010: BF A6 99 2F                                        .../
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 56 B1 C6 CD 2E 80 E5   7A D3 07 68 C9 B6 37 17  .V......z..h..7.
#         0010: EF AC 4B 42                                        ..KB
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.287 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1E 43 FF D9 A2 7B DA 7E   AC 59 6B F4 7A 3D 2B 6B  .C.......Yk.z=+k
#     0010: 33 C1 02 E9 AB 6E 0B E6   4C 44 0E 1E F5 CC B1 A4  3....n..LD......
#     0020: 09 1C 6D C9 7C 21 D3 15   24 A4 6C 19 C0 F2 45 46  ..m..!..$.l...EF
#     0030: 4D 13 8D 4B A9 47 FE 66   62 05 E9 F8 4C 11 4D 01  M..K.G.fb...L.M.
#     0040: 49 6C EF 3F A6 C9 82 7B   CD 3A 39 7D B6 CC FF 3D  Il.?.....:9....=
#     0050: 0D C6 C7 06 FB 7E BA 6C   FC 0E E7 0E D7 6F 9B 5A  .......l.....o.Z
#     0060: ED 31 7E 8C 18 BC AA D8   24 BE 09 D3 2E 9C C9 E0  .1......$.......
#     0070: 07 BC 5D 6A 50 94 F1 54   26 94 85 48 F9 12 28 0B  ..]jP..T&..H..(.
#     0080: 5C BB 5D FD 8C D3 45 69   80 C6 45 D5 F3 22 0E 58  \.]...Ei..E..".X
#     0090: 56 93 9C BB F7 2E 5A 50   19 C5 C1 E6 7A 68 83 14  V.....ZP....zh..
#     00A0: 2A DD 0E 2A 8B 31 E6 60   B7 89 82 35 0E E0 06 DF  *..*.1.`...5....
#     00B0: 9F 44 E7 D4 85 92 9A 22   19 61 21 2C A3 9C BF A4  .D.....".a!,....
#     00C0: 5E 9B 67 BA E4 BE 8E 23   73 0C 87 31 3A 97 FC 58  ^.g....#s..1:..X
#     00D0: 95 29 12 7B 56 1A 78 F6   E2 8B 00 99 38 AA 8E 7B  .)..V.x.....8...
#     00E0: 5B A1 DE 6B 9A CE 4F C8   7A B9 3C 61 97 73 FD F6  [..k..O.z.<a.s..
#     00F0: A6 BB E0 81 F6 27 1B 3F   65 6D A2 1D 1D 16 95 D1  .....'.?em......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.289 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 81 D0 7C 34 F4 A3 29 3A   21 D3 B0 90 93 F3 6F C0  ...4..):!.....o.
#     0010: EF 01 AC C8 DD A3 3D 50   2A 55 AD 50 A5 C9 A3 AF  ......=P*U.P....
#     0020: 0D 5E CC B2 EE 71 C9 F0   6E 23 48 D1 F9 CE 00 ED  .^...q..n#H.....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.291 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 15:33:43.292 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:43.292 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 15:33:43.293 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:43.294 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 15:33:43.294 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:43.294 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.295 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.299 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C EF FB 9D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 15:33:28.000 UTC",
#       "not  after"         : "2024-01-20 15:33:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 56 B1 C6 CD 2E 80 E5   7A D3 07 68 C9 B6 37 17  .V......z..h..7.
#           0010: EF AC 4B 42                                        ..KB
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 ED 2C 45 AA 08 D3 12   A2 FE FA 12 17 8C E8 01  1.,E............
#           0010: 38 9A DE 65                                        8..e
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.342 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 75 DB 48 61 1D 2B 1D 1F   F1 2C CD 0F 59 3A C7 98  u.Ha.+...,..Y:..
#     0010: 96 94 86 D8 E1 69 43 3C   7B 6D 35 20 4E 13 90 BB  .....iC<.m5 N...
#     0020: 8E F4 26 D5 81 8B 44 27   C8 17 89 73 60 C8 03 5A  ..&...D'...s`..Z
#     0030: CF 6F 57 37 33 03 08 68   C9 C6 7A AE 5F 4D E6 AF  .oW73..h..z._M..
#     0040: 3D 35 11 CA 1E 76 83 37   D5 5B 25 DF D3 E4 2A FE  =5...v.7.[%...*.
#     0050: 04 F0 80 2A 1E F4 1D 70   C3 5C CC 34 8F B0 99 FE  ...*...p.\.4....
#     0060: DE 51 30 25 9E EB 13 14   E1 0E 20 84 BB 99 50 E7  .Q0%...... ...P.
#     0070: B0 E5 76 9F 19 43 B6 93   C3 25 90 0D EA E7 80 DF  ..v..C...%......
#     0080: A9 37 CA 6A FD F7 A1 43   56 2E 02 AF CE 9C D1 83  .7.j...CV.......
#     0090: D7 C8 9F 24 93 D4 02 10   CD 6B 3C C6 D7 4D 57 C6  ...$.....k<..MW.
#     00A0: 13 06 97 85 58 19 B6 B3   26 37 64 EA 65 D2 4A CC  ....X...&7d.e.J.
#     00B0: 8D FD 5C 7C FD 87 C6 C8   54 75 72 8F 03 FC C5 F3  ..\.....Tur.....
#     00C0: 80 72 C7 65 0F 29 24 CE   D1 F6 A6 28 F6 8B 54 C7  .r.e.)$....(..T.
#     00D0: 98 FC 24 C5 BC D8 F7 4F   F9 98 57 11 51 93 8D B2  ..$....O..W.Q...
#     00E0: 1A 59 2B E3 AA E6 C7 37   95 78 F5 29 E5 FD 22 FD  .Y+....7.x.)..".
#     00F0: A3 50 88 76 1B 12 81 70   FD A6 59 0E F0 CA DB 73  .P.v...p..Y....s
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.346 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F4 80 0F 53 4C 99 B8 66   34 13 E1 BA 79 70 28 ED  ...SL..f4...yp(.
#     0010: 3B 32 65 DB D3 AE A7 79   0C 8D C6 1A 69 5E C7 19  ;2e....y....i^..
#     0020: 33 8D 3F A5 DB 4C 29 60   03 D6 48 15 3E 35 D9 23  3.?..L)`..H.>5.#
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.350 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 15:33:43.871 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 15:33:43.871 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 15:33:43.871 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 15:33:43.871 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:43.884 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5B 22 15 C6 8D A0 0B E7 E3 5C 0C 7E C1 DB 5B AA E4 75 AE C3 7E 39 F5 F7 68 87 3C 30 D6 9A DE D1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-22 15:33:44.092 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-22 15:33:44.093 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-22 15:33:45.035; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 15:33:45.039; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-22 15:33:45.425; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@743cb8e0(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-7Znqne/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7Znqne/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 15:33:45.427; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-7Znqne/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7Znqne/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 15:33:45.428; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(ca,h=[localhost],a=[],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-7Znqne/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7Znqne/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-22 15:33:45.464 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C EF FB 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 15:33:28.000 UTC",
#     "not  after"         : "2024-01-20 15:33:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 56 B1 C6 CD 2E 80 E5   7A D3 07 68 C9 B6 37 17  .V......z..h..7.
#         0010: EF AC 4B 42                                        ..KB
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 ED 2C 45 AA 08 D3 12   A2 FE FA 12 17 8C E8 01  1.,E............
#         0010: 38 9A DE 65                                        8..e
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 15:33:45.468 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 D6 31 57",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 15:33:20.000 UTC",
#     "not  after"         : "2024-01-20 15:33:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 A0 EB 8B 1A F3 1A B0   AE 5C 52 34 CE 7A 54 B7  .........\R4.zT.
#         0010: BF A6 99 2F                                        .../
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E CD 0B 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 15:33:22.000 UTC",
#     "not  after"         : "2024-01-20 15:33:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 A0 EB 8B 1A F3 1A B0   AE 5C 52 34 CE 7A 54 B7  .........\R4.zT.
#         0010: BF A6 99 2F                                        .../
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 56 B1 C6 CD 2E 80 E5   7A D3 07 68 C9 B6 37 17  .V......z..h..7.
#         0010: EF AC 4B 42                                        ..KB
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 15:33:45.479 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 15:33:45.954 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 15:33:45.955 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 15:33:45.956 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 15:33:45.956 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 15:33:45.960 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 15:33:45.970 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 15:33:45.971 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 15:33:45.971 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 15:33:45.973 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C2 A4 8C 1E DF 39 69 35 07 8E 77 B7 E2 A2 4A 6E B7 00 97 B5 39 44 70 C9 1C 13 63 A6 0D 74 2B 7D",
#   "session id"          : "E5 94 63 A0 38 E1 65 61 52 DE 67 D0 24 F2 3A 6D AE 48 9C 6A 53 13 95 C9 47 65 63 36 16 C0 25 B9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 58 9B E8 0E A8 24 7B F1   4D 9D DF 22 C4 24 72 44  X....$..M..".$rD
#             0010: 0C 1F C8 93 E5 C2 0C C8   6D 14 A7 5E EF A5 27 64  ........m..^..'d
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.085 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "5F 6E B5 78 13 64 EF 29 26 B6 39 A5 F0 FC 46 0D 89 4E FD DF 14 ED A1 C2 1A E4 40 2B 8B AA 46 03",
#   "session id"          : "E5 94 63 A0 38 E1 65 61 52 DE 67 D0 24 F2 3A 6D AE 48 9C 6A 53 13 95 C9 47 65 63 36 16 C0 25 B9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 33 1C EE CB 9F C6 F9 3F   4A 7F 88 7D 92 66 5F 8D  3......?J....f_.
#           0010: 63 C7 4A B7 F1 90 B4 DD   72 EE 24 F6 33 F0 62 14  c.J.....r.$.3.b.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.085 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.085 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.086 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.091 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.091 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.091 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.092 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.092 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.092 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.092 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.094 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.094 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.094 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:46.095 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:46.095 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.104 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.106 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.107 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.111 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.111 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.112 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.113 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.113 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.113 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.113 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:46.113 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:46.113 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.114 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.114 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.115 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.115 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.118 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.119 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:46.119 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.121 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 A5 BA 08",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 15:33:24.000 UTC",
#       "not  after"         : "2024-01-20 15:33:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 56 B1 C6 CD 2E 80 E5   7A D3 07 68 C9 B6 37 17  .V......z..h..7.
#           0010: EF AC 4B 42                                        ..KB
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 44 9E 31 53 B1 A5 07   17 AD FE F3 38 B4 AC EE  .D.1S.......8...
#           0010: 8F 29 C7 40                                        .).@
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.122 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.175 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E CD 0B 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 15:33:22.000 UTC",
#     "not  after"         : "2024-01-20 15:33:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 A0 EB 8B 1A F3 1A B0   AE 5C 52 34 CE 7A 54 B7  .........\R4.zT.
#         0010: BF A6 99 2F                                        .../
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 56 B1 C6 CD 2E 80 E5   7A D3 07 68 C9 B6 37 17  .V......z..h..7.
#         0010: EF AC 4B 42                                        ..KB
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.178 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 11 B6 66 BB 24 CB 1C 10   F7 07 8C FF 33 48 92 74  ..f.$.......3H.t
#     0010: 22 2C 50 3E E3 D6 C7 00   FA 2F 56 91 30 BB 12 39  ",P>...../V.0..9
#     0020: 6E EF 17 5E 6E FC BB 1A   71 EA 08 9C 48 FD AC EF  n..^n...q...H...
#     0030: 4E FD 5D 8D CA AA E4 38   F7 1A 8C 2E C8 F4 41 68  N.]....8......Ah
#     0040: 0D 4B A8 FB 74 35 BF 33   A4 78 60 A7 A5 7A DB 73  .K..t5.3.x`..z.s
#     0050: 38 94 F4 94 96 76 E3 82   7A 69 94 3A B4 16 EC 4D  8....v..zi.:...M
#     0060: 8B EA 88 72 0E 87 19 84   30 1E B2 FC 34 C6 69 6C  ...r....0...4.il
#     0070: 4A FF BA 92 0A 19 CB 19   51 97 C5 32 33 DF 59 2C  J.......Q..23.Y,
#     0080: 3F 1F 92 21 D0 98 A3 A0   F6 A2 9D 17 17 0C 86 69  ?..!...........i
#     0090: F9 3D E5 DA 7B 5B 74 5D   4E BF 67 E9 EC 7F 73 DF  .=...[t]N.g...s.
#     00A0: 6C 63 90 7D DD 79 57 97   20 21 7C 52 8E 54 01 75  lc...yW. !.R.T.u
#     00B0: C2 B0 07 F1 84 37 24 2D   8A 4D B4 AA 8B B0 52 34  .....7$-.M....R4
#     00C0: 3C D0 C3 52 F4 DF F1 34   22 06 AB 31 2A 79 DD CF  <..R...4"..1*y..
#     00D0: 16 6B 5C DF 2D 0C 23 EF   39 AC F2 02 D2 2B 0B F5  .k\.-.#.9....+..
#     00E0: 64 23 19 AA 7E B3 15 92   71 BE 69 E1 53 07 3F D0  d#......q.i.S.?.
#     00F0: 47 08 15 04 A7 28 DF 35   EF 46 48 83 49 D4 73 1E  G....(.5.FH.I.s.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.180 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C9 26 5B E7 4A B6 6B 6D   7A 69 4E 50 E9 5C A3 F9  .&[.J.kmziNP.\..
#     0010: 4A 0A 93 75 F3 7F F1 6F   57 57 2B 21 66 1E 58 DE  J..u...oWW+!f.X.
#     0020: A2 C8 17 12 53 91 A9 FD   7A AB BA 6B 35 2D 63 7A  ....S...z..k5-cz
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.184 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 15:33:46.184 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:46.184 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 15:33:46.185 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:46.185 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 15:33:46.185 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 15:33:46.185 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.185 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.187 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C EF FB 9D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 15:33:28.000 UTC",
#       "not  after"         : "2024-01-20 15:33:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 56 B1 C6 CD 2E 80 E5   7A D3 07 68 C9 B6 37 17  .V......z..h..7.
#           0010: EF AC 4B 42                                        ..KB
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 ED 2C 45 AA 08 D3 12   A2 FE FA 12 17 8C E8 01  1.,E............
#           0010: 38 9A DE 65                                        8..e
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.210 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 86 82 FA 03 29 A6 BB 37   72 24 1C 33 F9 7F A0 C9  ....)..7r$.3....
#     0010: D5 DE 76 4B 9B E8 F0 1D   5A 5A 95 71 3B 38 DD 2E  ..vK....ZZ.q;8..
#     0020: F3 A5 18 05 B7 73 8E A7   E4 B6 59 02 CC A1 25 EE  .....s....Y...%.
#     0030: 07 C5 3D 11 C9 08 F4 1F   01 87 70 67 14 1A 61 1F  ..=.......pg..a.
#     0040: 4F 86 8F 49 92 06 4D A9   83 D4 C2 B6 01 FA 1E CB  O..I..M.........
#     0050: 2F 37 97 78 07 DA 4B 45   77 10 E0 C7 50 E8 2F 1B  /7.x..KEw...P./.
#     0060: C6 09 FB 9A 62 A7 3C 66   CF CD 53 B6 CE 4E 9F EA  ....b.<f..S..N..
#     0070: 82 20 9E 05 C9 96 56 9D   F0 61 60 10 30 C9 81 A5  . ....V..a`.0...
#     0080: 05 39 06 51 96 7D 1A 8A   1D 69 A3 4A 2B B8 CB FD  .9.Q.....i.J+...
#     0090: B9 A0 AA 1D 05 85 D7 1C   4F E5 34 81 89 BE AA 22  ........O.4...."
#     00A0: 01 5C 39 EA 98 E8 68 DF   B6 55 FB 39 CF 12 9D C1  .\9...h..U.9....
#     00B0: 69 77 2C E3 01 83 B4 E0   08 D4 A0 1F C8 09 75 0E  iw,...........u.
#     00C0: 8A 6E 3F 39 AA 79 3F FC   5C 35 2C 11 07 30 F5 D0  .n?9.y?.\5,..0..
#     00D0: F2 7A 05 15 30 5C B0 5F   21 5C C9 A9 73 37 FF 62  .z..0\._!\..s7.b
#     00E0: AD CA 10 14 C6 B3 53 F9   21 5B 76 D1 09 38 9E FA  ......S.![v..8..
#     00F0: 98 BA 7C 9A 6F DB 44 D5   A5 BB 6F AD 86 0D 4C F7  ....o.D...o...L.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.211 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 99 13 CD 7C 9F 9E 7C 67   98 EC EF 6A 0D 7B 8C 2F  .......g...j.../
#     0010: 7F 9D 86 E5 84 2A 49 71   AF 4A DA 76 98 65 CB 76  .....*Iq.J.v.e.v
#     0020: F1 B8 E9 95 0B DC B6 22   09 25 C8 C1 FC 37 32 E5  .......".%...72.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.211 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 15:33:46.602 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C9 BB B8 E9 D4 D2 5D 41 B4 79 3E 39 47 F6 FB 07 08 58 2D 2E 70 96 58 6C B6 FC FB 8F D2 C4 F9 A5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-22 15:33:46.804 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-22 15:33:46.805 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (131 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-22 15:33:47.732; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-22 15:33:47.736; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-22 15:33:48.160 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C EF FB 9D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 15:33:28.000 UTC",
#       "not  after"         : "2024-01-20 15:33:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 56 B1 C6 CD 2E 80 E5   7A D3 07 68 C9 B6 37 17  .V......z..h..7.
#           0010: EF AC 4B 42                                        ..KB
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 ED 2C 45 AA 08 D3 12   A2 FE FA 12 17 8C E8 01  1.,E............
#           0010: 38 9A DE 65                                        8..e
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-22 15:33:48.164 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 D6 31 57",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 15:33:20.000 UTC",
#       "not  after"         : "2024-01-20 15:33:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B2 A0 EB 8B 1A F3 1A B0   AE 5C 52 34 CE 7A 54 B7  .........\R4.zT.
#           0010: BF A6 99 2F                                        .../
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3E CD 0B 50",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 15:33:22.000 UTC",
#       "not  after"         : "2024-01-20 15:33:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B2 A0 EB 8B 1A F3 1A B0   AE 5C 52 34 CE 7A 54 B7  .........\R4.zT.
#           0010: BF A6 99 2F                                        .../
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 56 B1 C6 CD 2E 80 E5   7A D3 07 68 C9 B6 37 17  .V......z..h..7.
#           0010: EF AC 4B 42                                        ..KB
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-22 15:33:48.176 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/63-6
# Last output:
# INFO  - 2023-10-22 15:33:49.858; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 15:33:49.863; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# javax.net.ssl|DEBUG|01|main|2023-10-22 15:33:50.302 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C EF FB 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 15:33:28.000 UTC",
#     "not  after"         : "2024-01-20 15:33:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 56 B1 C6 CD 2E 80 E5   7A D3 07 68 C9 B6 37 17  .V......z..h..7.
#         0010: EF AC 4B 42                                        ..KB
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 ED 2C 45 AA 08 D3 12   A2 FE FA 12 17 8C E8 01  1.,E............
#         0010: 38 9A DE 65                                        8..e
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 15:33:50.306 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 D6 31 57",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 15:33:20.000 UTC",
#     "not  after"         : "2024-01-20 15:33:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 A0 EB 8B 1A F3 1A B0   AE 5C 52 34 CE 7A 54 B7  .........\R4.zT.
#         0010: BF A6 99 2F                                        .../
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E CD 0B 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 15:33:22.000 UTC",
#     "not  after"         : "2024-01-20 15:33:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 A0 EB 8B 1A F3 1A B0   AE 5C 52 34 CE 7A 54 B7  .........\R4.zT.
#         0010: BF A6 99 2F                                        .../
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 56 B1 C6 CD 2E 80 E5   7A D3 07 68 C9 B6 37 17  .V......z..h..7.
#         0010: EF AC 4B 42                                        ..KB
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 15:33:50.318 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 15069ms
ok 65 stop command for single port in 17575ms
not ok 66 status detects locally running solr in 3794ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 20025 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 19601 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 14041 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 20025 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 19601 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 14041 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 250ms
ok 68 listing out files in 3974ms
ok 69 copying files around in 9707ms
ok 70 upconfig in 5020ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1219ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1222ms
not ok 73 Cleanup in 4705ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 20025 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 19601 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 14041 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 20025 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 19601 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 14041 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 5m 41s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/yyqo3hpymcnz2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 874 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/874/

All tests passed

Build Log:
[...truncated 1174 lines...]
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-22 10:48:43.339; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 10:48:43.391; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 3126ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-22 10:48:45.394; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 10:48:46.541; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 5406ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-22 10:48:48.592; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 10:48:51.959; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 6486ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-22 10:48:54.015; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 10:48:58.465; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 26650ms
ok 19 Check export command in 21040ms
ok 20 export fails on non cloud mode in 8915ms
not ok 21 using curl to extract a single pdf file in 9384ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 41107 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41107 (pid=16289). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-22 10:50:03.555; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 10:50:04.715; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 11442ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 41107 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41107 (pid=16716). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-22 10:50:12.850; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 10:50:16.202; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 7886ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 41107 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41107 (pid=17191). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-22 10:50:24.058; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 10:50:24.119; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 29800ms
ok 25 start help flag prints help in 151ms
ok 26 stop help flag prints help in 145ms
ok 27 restart help flag prints help in 151ms
ok 28 status help flag prints help in 47ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 143ms
ok 30 create help flag prints help in 144ms
ok 31 createcore help flag prints help in 145ms
ok 32 createcollection help flag prints help in 147ms
ok 33 delete help flag prints help in 146ms
ok 34 version help flag prints help in 48ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 152ms
ok 36 auth help flag prints help in 149ms
ok 37 assert help flag prints help in 804ms
ok 38 post help flag prints help in 831ms
not ok 39 SQL Module in 10388ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:41107/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-22 10:51:06.776; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 10:51:07.925; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:41107/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 20844ms
ok 41 icu collation in analysis-extras module in 13973ms
not ok 42 package detects no running solr in 1208ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 20025 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 20025 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9480ms
ok 44 deploying and undeploying a collection level package in 13141ms
ok 45 Affinity placement plugin using sysprop in 15700ms
ok 46 Random placement plugin using ENV in 17791ms
ok 47 Check help command in 3788ms
ok 48 basic post with a type specified in 5795ms
ok 49 basic post WITHOUT a type specified in 11877ms
ok 50 crawling a directory in 4312ms
ok 51 crawling a web site in 5107ms
ok 52 commit and optimize and delete in 3749ms
ok 53 args mode in 5992ms
ok 54 stdin mode in 3152ms
ok 55 post solr log into solr via script in 9573ms
ok 56 post solr log into solr via cli in 6660ms
ok 57 allowPaths - backup in 21418ms
ok 58 start solr with ssl in 17514ms
ok 59 use different hostname when not checking peer-name in 29898ms
ok 60 start solr with ssl and auth in 16590ms
ok 61 start solr with client truststore and security manager in 19683ms
ok 62 start solr with mTLS needed in 65329ms
not ok 63 start solr with mTLS wanted in 39039ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 475)
#   `assert_output --partial "Created collection 'test'"' failed
# /tmp/bats-run-pIxdnY/test/63/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41107 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41107 (pid=1553). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41108 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41108 (pid=1676). Happy searching!
#
#     INFO  - 2023-10-22 10:57:05.703; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 10:57:05.710; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-22 10:57:06.532; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-pIxdnY/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-pIxdnY/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 10:57:06.535; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-pIxdnY/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-pIxdnY/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 10:57:06.537; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-pIxdnY/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-pIxdnY/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-22 10:57:07.010 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 6B F7 6E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 10:56:52.000 UTC",
#     "not  after"         : "2024-01-20 10:56:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 56 3F 66 B6 1B DF 81 7F   62 FC 27 D8 69 48 B5 68  V?f.....b.'.iH.h
#         0010: 9F F8 5E DD                                        ..^.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 35 C8 89 AA 38 B6 29   99 82 46 47 09 CB 3A DA  f5...8.)..FG..:.
#         0010: 20 3A 0E 8A                                         :..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 10:57:07.019 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 6C B4 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 10:56:46.000 UTC",
#     "not  after"         : "2024-01-20 10:56:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 3E 9D E0 13 43 21 6F   E3 39 DE E8 40 20 DE 6F  .>...C!o.9..@ .o
#         0010: C8 00 D6 A7                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 56 3F 66 B6 1B DF 81 7F   62 FC 27 D8 69 48 B5 68  V?f.....b.'.iH.h
#         0010: 9F F8 5E DD                                        ..^.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 7F FB 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 10:56:44.000 UTC",
#     "not  after"         : "2024-01-20 10:56:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 3E 9D E0 13 43 21 6F   E3 39 DE E8 40 20 DE 6F  .>...C!o.9..@ .o
#         0010: C8 00 D6 A7                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 10:57:07.037 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 10:57:07.394 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 10:57:07.394 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 10:57:07.554 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 10:57:07.554 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 10:57:07.758 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 10:57:07.771 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 10:57:07.771 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 10:57:07.772 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 10:57:07.775 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "11 A1 F1 33 B3 52 1E A8 F7 75 0D 99 55 D7 B3 D8 60 EE 3C E1 FC 8C F2 4F 0A 48 E1 AE 6B C8 36 70",
#   "session id"          : "59 39 31 44 CF 11 00 CB F1 E9 84 9B 2C 87 25 77 3D 0B 06 F8 85 B8 0F A8 6B 0D 3B A5 52 CD DA C7",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 99 BD C3 77 DE E5 DA 3E   08 63 C1 4B 10 C1 26 2A  ...w...>.c.K..&*
#             0010: 83 A2 1D 44 8A 40 D0 DB   48 85 E4 64 89 94 CA 5F  ...D.@..H..d..._
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.877 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "7A E8 61 63 8D B9 92 11 79 0A D7 55 19 83 89 4F 51 FE 4E A8 03 D5 BC F5 DA E0 20 D6 0E D1 CC DB",
#   "session id"          : "59 39 31 44 CF 11 00 CB F1 E9 84 9B 2C 87 25 77 3D 0B 06 F8 85 B8 0F A8 6B 0D 3B A5 52 CD DA C7",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: EF 86 1E CF 00 C9 B2 9D   4B A3 99 12 CA F0 14 0C  ........K.......
#           0010: C7 AC 1F C9 DE 7A A6 68   7D 29 9A 1C 75 24 58 06  .....z.h.)..u$X.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.878 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.878 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.879 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.880 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.880 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.882 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.883 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.883 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.883 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.883 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.888 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.888 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.888 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.889 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.889 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.889 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.889 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.889 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.889 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.889 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:07.889 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:07.889 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.889 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.889 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.909 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.911 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.912 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.915 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.915 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.915 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.916 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.916 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.916 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.916 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:07.916 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:07.916 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.917 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.917 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.917 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.918 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.918 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.919 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:07.919 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.922 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 4D FE DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 10:56:49.000 UTC",
#       "not  after"         : "2024-01-20 10:56:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 56 3F 66 B6 1B DF 81 7F   62 FC 27 D8 69 48 B5 68  V?f.....b.'.iH.h
#           0010: 9F F8 5E DD                                        ..^.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 43 CE 7A 02 84 5C 72 80   91 C8 78 2C 71 97 CD 5D  C.z..\r...x,q..]
#           0010: E5 0A 56 10                                        ..V.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:07.922 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:08.022 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 6C B4 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 10:56:46.000 UTC",
#     "not  after"         : "2024-01-20 10:56:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 3E 9D E0 13 43 21 6F   E3 39 DE E8 40 20 DE 6F  .>...C!o.9..@ .o
#         0010: C8 00 D6 A7                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 56 3F 66 B6 1B DF 81 7F   62 FC 27 D8 69 48 B5 68  V?f.....b.'.iH.h
#         0010: 9F F8 5E DD                                        ..^.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:08.025 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F E9 9A 30 B1 48 C0 78   0F 16 37 32 D2 73 1B CE  _..0.H.x..72.s..
#     0010: AA 46 D5 7D 11 2A B0 64   64 04 15 67 B9 B1 81 91  .F...*.dd..g....
#     0020: 2F 35 61 F5 7B AF D8 26   12 AE C8 07 38 83 96 86  /5a....&....8...
#     0030: DA 26 91 C9 35 F5 8B 67   AA E1 C8 83 4F 37 3B A3  .&..5..g....O7;.
#     0040: 87 F4 1C D9 CE BF 01 D9   96 0A 9B 2B DB 14 6D B5  ...........+..m.
#     0050: 7E 08 DE 20 21 1D A6 99   F1 C9 41 29 4B D3 30 E1  ... !.....A)K.0.
#     0060: A1 7E CC 95 74 D6 DD F6   BA 1C EE 81 CF 51 15 DA  ....t........Q..
#     0070: BF 2B 9A E1 E7 6F E5 19   58 4C 99 07 B7 7E 3A A9  .+...o..XL....:.
#     0080: 97 99 3F 5F 6B C7 59 A9   5A 97 7D B6 D4 73 29 38  ..?_k.Y.Z....s)8
#     0090: 9D 94 31 B5 5F AE 50 B6   56 84 4B 1C F2 18 78 03  ..1._.P.V.K...x.
#     00A0: F9 5F 0E 57 C9 10 F6 10   8D E7 DB 98 E4 EC 7F 70  ._.W...........p
#     00B0: 0C 9E 29 8B 04 47 02 9C   A9 C9 49 5D AE 6E 6B 8E  ..)..G....I].nk.
#     00C0: 7E 79 72 16 A3 80 11 A0   58 D7 BE 7D E9 4A F6 85  .yr.....X....J..
#     00D0: 86 85 24 15 42 EB FA B4   B2 D0 0F 9D 39 4F 11 65  ..$.B.......9O.e
#     00E0: 5D 98 25 18 E2 FE 35 7E   83 F4 A9 B2 3A 01 BC 67  ].%...5.....:..g
#     00F0: 38 EA 86 30 63 E2 82 5C   D3 DF 97 56 2B BF 89 A6  8..0c..\...V+...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:08.026 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5B 0F AD 65 4D 33 CB 90   36 4C 30 B6 96 13 AE 67  [..eM3..6L0....g
#     0010: 27 79 FD 55 43 BC 3E 42   5E D9 A9 23 34 C3 61 08  'y.UC.>B^..#4.a.
#     0020: DF 39 68 F2 B4 D9 CD AD   9F AF CF 48 A7 44 43 EA  .9h........H.DC.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:08.027 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 10:57:08.028 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:08.028 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 10:57:08.029 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:08.029 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 10:57:08.029 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:08.029 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:08.029 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:08.030 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 6B F7 6E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 10:56:52.000 UTC",
#       "not  after"         : "2024-01-20 10:56:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 56 3F 66 B6 1B DF 81 7F   62 FC 27 D8 69 48 B5 68  V?f.....b.'.iH.h
#           0010: 9F F8 5E DD                                        ..^.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 35 C8 89 AA 38 B6 29   99 82 46 47 09 CB 3A DA  f5...8.)..FG..:.
#           0010: 20 3A 0E 8A                                         :..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:08.052 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 63 D8 B0 AD F6 22 EC BB   A5 65 C5 EE BA E1 D8 3B  c...."...e.....;
#     0010: 3B B8 5B 55 B9 47 98 B9   ED A7 E2 55 81 FD EB 67  ;.[U.G.....U...g
#     0020: DD A5 AA F9 83 44 06 7A   3B 54 D0 D1 B6 25 2A 80  .....D.z;T...%*.
#     0030: B3 CF C1 43 10 0F 29 9E   10 E6 DC E6 3C F9 37 6B  ...C..).....<.7k
#     0040: FC 57 3D 85 83 DC 98 B6   B7 79 24 E1 C1 B0 03 2F  .W=......y$..../
#     0050: 0F C2 FC 6D 59 9B DE 26   1B 23 96 6A 9E CE 66 8C  ...mY..&.#.j..f.
#     0060: FD 03 29 2B C0 B0 27 52   DB 8D 9E 13 76 45 68 D0  ..)+..'R....vEh.
#     0070: 55 C7 BE 20 D0 11 BA 99   1F 46 A8 64 AE 9B 42 5C  U.. .....F.d..B\
#     0080: 16 72 9C 80 E3 22 B1 D8   DF 99 DB 98 D4 F2 78 17  .r..."........x.
#     0090: A0 24 1C 33 E9 5C 5F EC   B5 60 EA B6 D8 2D D8 C0  .$.3.\_..`...-..
#     00A0: 45 00 D9 65 FD 6C 7B 3E   DA 3C FE E1 95 FD 2B 50  E..e.l.>.<....+P
#     00B0: 46 E1 1B 23 55 9E 1F 00   8C 05 49 B8 78 3E 15 12  F..#U.....I.x>..
#     00C0: 27 2E EC 38 47 94 6D 88   14 32 AD 53 C4 3C B9 15  '..8G.m..2.S.<..
#     00D0: B8 4E 25 CF 04 98 E5 F0   94 69 64 34 83 58 44 CC  .N%......id4.XD.
#     00E0: 08 B9 90 8E 1C 7F F9 37   8D F5 BC B3 5F 93 14 6F  .......7...._..o
#     00F0: 4B C4 CA C0 18 66 11 96   13 8B 7E 58 13 8E 94 3E  K....f.....X...>
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:08.053 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C6 F3 6D E4 4B 23 9D E6   91 FA 03 68 5C 83 2C A6  ..m.K#.....h\.,.
#     0010: E4 41 91 39 8E 59 BA F3   09 AC 51 2D C1 FC DD EF  .A.9.Y....Q-....
#     0020: 2D 7A 09 61 13 97 5D C2   E6 55 20 F2 86 25 66 66  -z.a..]..U ..%ff
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:08.053 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 10:57:08.092 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 10:57:08.092 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 10:57:08.092 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 10:57:08.092 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-22 10:57:08.122 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "31 16 27 A5 52 8E 08 60 CE CF 98 1A BE 41 D8 AF 4F E4 68 AF D8 01 50 AF ED 2F 84 08 E4 24 C4 02",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-22 10:57:08.504 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-22 10:57:08.505 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-22 10:57:09.715; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 10:57:09.719; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-22 10:57:10.059; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-pIxdnY/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-pIxdnY/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 10:57:10.061; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-pIxdnY/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-pIxdnY/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 10:57:10.061; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-pIxdnY/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-pIxdnY/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-22 10:57:10.095 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 6B F7 6E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 10:56:52.000 UTC",
#     "not  after"         : "2024-01-20 10:56:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 56 3F 66 B6 1B DF 81 7F   62 FC 27 D8 69 48 B5 68  V?f.....b.'.iH.h
#         0010: 9F F8 5E DD                                        ..^.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 35 C8 89 AA 38 B6 29   99 82 46 47 09 CB 3A DA  f5...8.)..FG..:.
#         0010: 20 3A 0E 8A                                         :..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 10:57:10.098 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 6C B4 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 10:56:46.000 UTC",
#     "not  after"         : "2024-01-20 10:56:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 3E 9D E0 13 43 21 6F   E3 39 DE E8 40 20 DE 6F  .>...C!o.9..@ .o
#         0010: C8 00 D6 A7                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 56 3F 66 B6 1B DF 81 7F   62 FC 27 D8 69 48 B5 68  V?f.....b.'.iH.h
#         0010: 9F F8 5E DD                                        ..^.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 7F FB 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 10:56:44.000 UTC",
#     "not  after"         : "2024-01-20 10:56:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 3E 9D E0 13 43 21 6F   E3 39 DE E8 40 20 DE 6F  .>...C!o.9..@ .o
#         0010: C8 00 D6 A7                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 10:57:10.109 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 10:57:10.623 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 10:57:10.623 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 10:57:10.628 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 10:57:10.628 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 10:57:10.634 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 10:57:10.646 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 10:57:10.646 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 10:57:10.646 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 10:57:10.651 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "42 70 97 C4 A4 67 BC EC F5 F5 A8 D3 A4 D2 98 CA 87 0A 83 A2 10 57 94 EF F0 3F C2 12 40 CA A2 C8",
#   "session id"          : "9D F2 56 17 EE 80 AC 43 F4 3A E6 AB 4E 25 88 0E 29 75 DE EE 9D 34 A0 34 CC 68 82 2C 99 EF 4E 02",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 88 84 B5 2B E7 E0 34 02   94 CA AF 10 8E 98 94 45  ...+..4........E
#             0010: 10 19 4B B2 1A 98 9B 45   17 29 66 6E FF 22 4A 1D  ..K....E.)fn."J.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.758 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "81 DF E2 26 E3 1A D0 3E 6B 7F BA 60 DE 29 47 69 E2 FB CB 20 53 9B C3 97 2E 33 DF 7C CE DB 49 48",
#   "session id"          : "9D F2 56 17 EE 80 AC 43 F4 3A E6 AB 4E 25 88 0E 29 75 DE EE 9D 34 A0 34 CC 68 82 2C 99 EF 4E 02",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 0D 7E B1 12 6F 66 06 62   D7 2E 4E A4 D6 DC B8 6E  ....of.b..N....n
#           0010: 80 7D E1 8B 42 AD 94 E3   15 56 57 45 9C 5A 17 5B  ....B....VWE.Z.[
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.758 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.759 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.763 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.763 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.763 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.763 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.764 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.764 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.764 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.764 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.765 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.765 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.766 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.766 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.766 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.766 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.766 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.766 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.766 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.766 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:10.766 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:10.767 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.767 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.767 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.779 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.781 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.781 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.787 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.787 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.787 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.787 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.787 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.787 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.787 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:10.788 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:10.788 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.789 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.790 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.790 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.790 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.790 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.791 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:10.791 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.793 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 4D FE DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 10:56:49.000 UTC",
#       "not  after"         : "2024-01-20 10:56:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 56 3F 66 B6 1B DF 81 7F   62 FC 27 D8 69 48 B5 68  V?f.....b.'.iH.h
#           0010: 9F F8 5E DD                                        ..^.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 43 CE 7A 02 84 5C 72 80   91 C8 78 2C 71 97 CD 5D  C.z..\r...x,q..]
#           0010: E5 0A 56 10                                        ..V.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.793 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 10:57:10.840 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 10:57:10.840 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 10:57:10.840 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 10:57:10.840 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.854 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 6C B4 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 10:56:46.000 UTC",
#     "not  after"         : "2024-01-20 10:56:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 3E 9D E0 13 43 21 6F   E3 39 DE E8 40 20 DE 6F  .>...C!o.9..@ .o
#         0010: C8 00 D6 A7                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 56 3F 66 B6 1B DF 81 7F   62 FC 27 D8 69 48 B5 68  V?f.....b.'.iH.h
#         0010: 9F F8 5E DD                                        ..^.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.866 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F 0A 60 5A DA FF 47 F5   77 D8 AE D3 E2 5A E6 D1  _.`Z..G.w....Z..
#     0010: 57 C5 07 7F 7F 47 E0 FD   BC A4 54 6B A7 7E DD C7  W....G....Tk....
#     0020: 5D 7F 17 FE 4F E5 EF 16   F8 9E 9C 26 0E 94 EF 57  ]...O......&...W
#     0030: 35 C4 97 C1 23 90 16 E2   40 41 07 E0 C2 EF 9F 52  5...#...@A.....R
#     0040: 1B 18 A3 BB 65 65 95 FB   33 14 E0 3C 58 29 57 DE  ....ee..3..<X)W.
#     0050: C9 D0 66 CA 47 F9 D0 58   83 5B AB 4A 0D 07 86 43  ..f.G..X.[.J...C
#     0060: B9 E4 94 9B 60 6E 96 A6   B7 DF A2 71 69 F4 1C 37  ....`n.....qi..7
#     0070: 48 41 BE B0 6F 9F E7 F1   12 0E 93 A5 EF 8B 84 E4  HA..o...........
#     0080: 8A DC 4F 8F B6 4D B8 69   4F C3 04 05 DA 10 A6 1E  ..O..M.iO.......
#     0090: B0 72 E1 7D 2D A2 F6 7B   B7 FA AB B7 B0 F8 DC 31  .r..-..........1
#     00A0: B1 7E 80 F7 95 5B 1A 47   77 B5 E2 24 EE E3 2D E9  .....[.Gw..$..-.
#     00B0: 5F F5 98 6A 39 A4 FB 30   35 EB 3F 41 18 91 BB 33  _..j9..05.?A...3
#     00C0: 0A FC 69 36 AF A1 5C B4   23 A3 D9 3E 32 B3 BA 9A  ..i6..\.#..>2...
#     00D0: D0 B7 32 D6 1F D6 26 33   2A 27 43 FE 1A 92 F1 D3  ..2...&3*'C.....
#     00E0: 05 46 7E 2A 66 40 B0 BD   26 62 8A 76 45 A1 82 74  .F.*f@..&b.vE..t
#     00F0: 61 32 3D F4 C2 D3 CE 40   5F A8 54 6D B5 81 DF F9  a2=....@_.Tm....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.868 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 41 8A C0 F0 82 83 15 FE   79 41 D2 15 35 E4 84 D9  A.......yA..5...
#     0010: DF 11 7B CC 35 07 A8 C6   C8 38 CB 67 7A 71 14 51  ....5....8.gzq.Q
#     0020: 2E 64 C2 CD 46 39 24 BD   4B F8 77 47 3D E7 B5 EC  .d..F9$.K.wG=...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.870 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 10:57:10.870 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:10.870 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 10:57:10.870 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:10.871 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 10:57:10.871 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 10:57:10.871 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.871 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.872 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 6B F7 6E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 10:56:52.000 UTC",
#       "not  after"         : "2024-01-20 10:56:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 56 3F 66 B6 1B DF 81 7F   62 FC 27 D8 69 48 B5 68  V?f.....b.'.iH.h
#           0010: 9F F8 5E DD                                        ..^.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 35 C8 89 AA 38 B6 29   99 82 46 47 09 CB 3A DA  f5...8.)..FG..:.
#           0010: 20 3A 0E 8A                                         :..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.898 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 17 72 B4 F1 2B 84 39 85   C7 19 51 A4 6F 74 AC DA  .r..+.9...Q.ot..
#     0010: B0 73 F4 B5 77 40 DA 1A   13 F1 E9 D0 61 D4 65 E6  .s..w@......a.e.
#     0020: F9 51 29 BC 52 26 66 BA   04 ED 6B 62 E5 3D DD E4  .Q).R&f...kb.=..
#     0030: 81 ED 61 90 A9 03 1A 5C   33 61 CA 87 1A FF 5C 39  ..a....\3a....\9
#     0040: 4E 68 7C 30 A2 02 DD 52   F3 52 32 B2 3C 2F 05 C5  Nh.0...R.R2.</..
#     0050: 48 44 D7 51 2A 2A 56 1C   B0 B4 C7 9B E1 E6 E5 96  HD.Q**V.........
#     0060: 71 9B 64 12 B6 DE 52 BD   55 70 4A 8B 26 E2 74 A0  q.d...R.UpJ.&.t.
#     0070: B0 F9 B3 05 DB E3 3E 6E   78 E4 D4 2A 2C EB D4 B4  ......>nx..*,...
#     0080: C2 DE 33 A7 CF 3C AE FB   2F 0D 7F 18 5C EF B0 02  ..3..<../...\...
#     0090: DA A4 F4 C5 03 27 5D C5   C3 56 C0 5A 27 8C 01 D9  .....']..V.Z'...
#     00A0: 8F 38 EB 52 F9 8C 11 36   A9 87 66 78 B2 E6 70 77  .8.R...6..fx..pw
#     00B0: BF CA F8 9F 86 6E 75 A9   AE 9F CA 57 4E 88 DC BB  .....nu....WN...
#     00C0: 6D 83 2F C3 E7 06 25 A8   A9 73 15 57 39 94 CA A9  m./...%..s.W9...
#     00D0: 74 CB 59 61 9A 2C 62 4C   4B 43 B2 DD 59 84 24 32  t.Ya.,bLKC..Y.$2
#     00E0: 76 92 7A 22 E3 7A FF 42   5D CF 1E 02 FE A2 CD 8D  v.z".z.B].......
#     00F0: EF 49 5D 19 2E C6 9D E2   E1 FA 91 54 55 84 49 E4  .I]........TU.I.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.898 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6E 1C 8C 2B FB 1F 92 B7   7A BA A3 61 C2 24 84 41  n..+....z..a.$.A
#     0010: 40 D2 84 72 9C C2 EE 4D   98 45 C4 2E A3 AF C3 D1  @..r...M.E......
#     0020: 4A 92 75 E3 ED 5C 47 8F   48 DA A7 05 5F 65 53 E7  J.u..\G.H..._eS.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.899 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 10:57:10.957 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5F 78 76 44 DB 1F 50 45 D9 CD 6D 24 4D 05 00 60 5A D7 7C 96 B7 A8 B9 7B EB 39 04 97 01 A1 A0 16",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-22 10:57:11.117 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-22 10:57:11.117 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (131 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-22 10:57:12.005; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-22 10:57:12.012; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-22 10:57:12.383 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 6B F7 6E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 10:56:52.000 UTC",
#       "not  after"         : "2024-01-20 10:56:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 56 3F 66 B6 1B DF 81 7F   62 FC 27 D8 69 48 B5 68  V?f.....b.'.iH.h
#           0010: 9F F8 5E DD                                        ..^.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 35 C8 89 AA 38 B6 29   99 82 46 47 09 CB 3A DA  f5...8.)..FG..:.
#           0010: 20 3A 0E 8A                                         :..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-22 10:57:12.387 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 6C B4 0C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 10:56:46.000 UTC",
#       "not  after"         : "2024-01-20 10:56:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 3E 9D E0 13 43 21 6F   E3 39 DE E8 40 20 DE 6F  .>...C!o.9..@ .o
#           0010: C8 00 D6 A7                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 56 3F 66 B6 1B DF 81 7F   62 FC 27 D8 69 48 B5 68  V?f.....b.'.iH.h
#           0010: 9F F8 5E DD                                        ..^.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 7F FB 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 10:56:44.000 UTC",
#       "not  after"         : "2024-01-20 10:56:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 3E 9D E0 13 43 21 6F   E3 39 DE E8 40 20 DE 6F  .>...C!o.9..@ .o
#           0010: C8 00 D6 A7                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-22 10:57:12.398 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/63-6
# Last output:
# INFO  - 2023-10-22 10:57:13.944; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 10:57:13.948; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# javax.net.ssl|DEBUG|01|main|2023-10-22 10:57:14.308 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 6B F7 6E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 10:56:52.000 UTC",
#     "not  after"         : "2024-01-20 10:56:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 56 3F 66 B6 1B DF 81 7F   62 FC 27 D8 69 48 B5 68  V?f.....b.'.iH.h
#         0010: 9F F8 5E DD                                        ..^.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 35 C8 89 AA 38 B6 29   99 82 46 47 09 CB 3A DA  f5...8.)..FG..:.
#         0010: 20 3A 0E 8A                                         :..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 10:57:14.311 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 6C B4 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 10:56:46.000 UTC",
#     "not  after"         : "2024-01-20 10:56:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 3E 9D E0 13 43 21 6F   E3 39 DE E8 40 20 DE 6F  .>...C!o.9..@ .o
#         0010: C8 00 D6 A7                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 56 3F 66 B6 1B DF 81 7F   62 FC 27 D8 69 48 B5 68  V?f.....b.'.iH.h
#         0010: 9F F8 5E DD                                        ..^.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 7F FB 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 10:56:44.000 UTC",
#     "not  after"         : "2024-01-20 10:56:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 3E 9D E0 13 43 21 6F   E3 39 DE E8 40 20 DE 6F  .>...C!o.9..@ .o
#         0010: C8 00 D6 A7                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 10:57:14.322 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 13733ms
ok 65 stop command for single port in 16960ms
not ok 66 status detects locally running solr in 2335ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 20025 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 19601 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 20025 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 19601 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 220ms
ok 68 listing out files in 2738ms
ok 69 copying files around in 19331ms
ok 70 upconfig in 2671ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1221ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1205ms
not ok 73 Cleanup in 3340ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 20025 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 19601 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 20025 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 19601 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 25s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/er3nv42h2qylw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 873 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/873/

All tests passed

Build Log:
[...truncated 1203 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-22 01:55:17.577; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-22 01:55:19.823; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1142ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 19601 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 19601 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9186ms
ok 44 deploying and undeploying a collection level package in 13075ms
ok 45 Affinity placement plugin using sysprop in 18907ms
ok 46 Random placement plugin using ENV in 14093ms
ok 47 Check help command in 4485ms
ok 48 basic post with a type specified in 5034ms
ok 49 basic post WITHOUT a type specified in 11178ms
ok 50 crawling a directory in 4559ms
ok 51 crawling a web site in 4820ms
ok 52 commit and optimize and delete in 3586ms
ok 53 args mode in 6147ms
ok 54 stdin mode in 3490ms
ok 55 post solr log into solr via script in 12851ms
ok 56 post solr log into solr via cli in 6390ms
ok 57 allowPaths - backup in 17157ms
ok 58 start solr with ssl in 18875ms
ok 59 use different hostname when not checking peer-name in 29566ms
not ok 60 start solr with ssl and auth in 10368ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 33939 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33939 (pid=11101). Happy searching!
#
#     INFO  - 2023-10-22 01:58:41.974; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 01:58:41.978; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-22 01:58:44.978; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 01:58:44.982; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13287ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-22 01:58:53.492; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-22 01:58:57.268; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-22 01:58:58.530; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 38436ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-gqU7Oa/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 33939 [|]   [/]   [-]   [\]
# Started Solr server on port 33939 (pid=12855). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 33940 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33940 (pid=12962). Happy searching!
#
#     INFO  - 2023-10-22 01:59:22.608; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 01:59:22.611; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-22 01:59:22.926; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@743cb8e0(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-gqU7Oa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gqU7Oa/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 01:59:22.928; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-gqU7Oa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gqU7Oa/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 01:59:22.929; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(ca,h=[localhost],a=[],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-gqU7Oa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gqU7Oa/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-22 01:59:22.963 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 91 64 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 01:59:10.000 UTC",
#     "not  after"         : "2024-01-20 01:59:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#         0010: 87 76 E5 81                                        .v..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 75 C4 24 A0 FE 06 A7   40 56 BC 83 E6 74 0C AC  .u.$....@V...t..
#         0010: 26 D4 5F 30                                        &._0
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6E D4 2D 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 01:59:03.000 UTC",
#     "not  after"         : "2024-01-20 01:59:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 57 F9 B4 9A 0A F6 6B   21 F8 4A 6B 0A 5C 5C 35  .W.....k!.Jk.\\5
#         0010: 40 8B E3 E0                                        @...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#         0010: 87 76 E5 81                                        .v..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 01:59:22.966 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6E D4 2D 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 01:59:03.000 UTC",
#     "not  after"         : "2024-01-20 01:59:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 57 F9 B4 9A 0A F6 6B   21 F8 4A 6B 0A 5C 5C 35  .W.....k!.Jk.\\5
#         0010: 40 8B E3 E0                                        @...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#         0010: 87 76 E5 81                                        .v..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 6F 71 C1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 01:59:02.000 UTC",
#     "not  after"         : "2024-01-20 01:59:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 57 F9 B4 9A 0A F6 6B   21 F8 4A 6B 0A 5C 5C 35  .W.....k!.Jk.\\5
#         0010: 40 8B E3 E0                                        @...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 01:59:22.977 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 01:59:23.124 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 01:59:23.124 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 01:59:23.126 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 01:59:23.126 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 01:59:23.130 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 01:59:23.139 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 01:59:23.139 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 01:59:23.139 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 01:59:23.141 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "20 8C 12 43 E0 D8 13 20 A5 1F F0 75 55 DD F9 B0 B7 8E 68 73 0C C4 93 8B 01 24 49 40 6B C8 AA 34",
#   "session id"          : "28 63 1D 47 10 85 B3 3B BD 80 79 40 DA D1 AC D6 5E 61 09 3F AF 18 C5 82 43 CE F6 E1 AB 67 34 91",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 56 1D 60 9C EB C0 B7 EB   B8 92 8B 27 AC AD FC CE  V.`........'....
#             0010: C9 83 7F F9 39 E2 29 66   AA AA 49 00 33 75 93 74  ....9.)f..I.3u.t
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.246 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "04 6F 31 19 D1 C7 0B 7A B1 E5 EC B0 2B E2 A9 41 D9 6F BA A3 85 BC 3E 35 09 EC 12 A2 52 9C A2 F6",
#   "session id"          : "28 63 1D 47 10 85 B3 3B BD 80 79 40 DA D1 AC D6 5E 61 09 3F AF 18 C5 82 43 CE F6 E1 AB 67 34 91",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 29 2D CC 21 62 6A 34 88   FA 67 28 12 5A 98 B7 50  )-.!bj4..g(.Z..P
#           0010: 5A 18 41 C5 B2 DE 2A 34   DD 87 D3 7D AD 30 D4 29  Z.A...*4.....0.)
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.246 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.246 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.247 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.247 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.248 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.248 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.248 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.248 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.248 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.248 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.251 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.251 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.251 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.251 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.251 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.252 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.252 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.252 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.252 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.252 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:23.252 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:23.252 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.252 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.252 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.270 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.271 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.272 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.275 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.275 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.275 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.275 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.275 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.275 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.275 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:23.276 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:23.276 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.278 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.283 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.283 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.284 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.286 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.287 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:23.287 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.292 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 51 66 37",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 01:59:06.000 UTC",
#       "not  after"         : "2024-01-20 01:59:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#           0010: 87 76 E5 81                                        .v..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 EF A1 48 CC 16 DA 74   A7 25 74 66 1C AE D3 60  ...H...t.%tf...`
#           0010: D0 B0 FB 3D                                        ...=
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.292 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.349 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6E D4 2D 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 01:59:03.000 UTC",
#     "not  after"         : "2024-01-20 01:59:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 57 F9 B4 9A 0A F6 6B   21 F8 4A 6B 0A 5C 5C 35  .W.....k!.Jk.\\5
#         0010: 40 8B E3 E0                                        @...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#         0010: 87 76 E5 81                                        .v..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.352 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6A F5 79 9C 2A A1 5D A7   77 9B DF F3 15 16 07 3F  j.y.*.].w......?
#     0010: 74 10 73 A4 26 AB E0 27   71 A4 13 BB 37 64 D1 FA  t.s.&..'q...7d..
#     0020: 87 F4 50 5E 18 92 98 DC   A0 73 2E 6F BE 2A C8 5E  ..P^.....s.o.*.^
#     0030: CB 80 1D 11 FC A9 0B 10   7E F3 88 13 2F E2 89 2E  ............/...
#     0040: 1B 81 4D 62 89 37 8C 13   AC 7B 02 17 8C BE 53 55  ..Mb.7........SU
#     0050: 1E A1 89 1D 70 99 DE D3   27 7A A9 5F 3B D6 3A 56  ....p...'z._;.:V
#     0060: 08 32 F2 EF E8 D5 56 66   13 F7 5E B6 7D 98 BF FA  .2....Vf..^.....
#     0070: C0 07 37 37 0F 05 D4 7B   E8 B3 79 35 AF E7 2C 28  ..77......y5..,(
#     0080: 82 3F 32 31 F6 03 FC 2F   2E 64 5D E3 AF A2 79 91  .?21.../.d]...y.
#     0090: 62 68 52 13 4F 7E B6 E7   6C 9C F2 6F D8 9B 9E BA  bhR.O...l..o....
#     00A0: CD F6 75 30 B0 11 7F 5A   C0 00 A3 6C AD 22 0C 18  ..u0...Z...l."..
#     00B0: 96 44 06 23 06 E5 A7 7D   FD CE C1 63 83 CA 99 01  .D.#.......c....
#     00C0: 0B 39 4A B7 BE 5A 61 07   91 78 D5 0C D7 72 4A DC  .9J..Za..x...rJ.
#     00D0: A9 11 6C 34 65 58 97 EB   D9 39 24 0D 13 C2 AF 30  ..l4eX...9$....0
#     00E0: 85 F6 BA CF 0C ED 96 AD   BA 43 DE BF 12 90 36 CB  .........C....6.
#     00F0: 7A 68 8A 31 6C 8C A8 E5   5F 63 71 E9 F4 40 4F 3F  zh.1l..._cq..@O?
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.353 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9D 65 88 E7 EB A8 22 7F   97 04 D2 1F 60 64 2E 48  .e....".....`d.H
#     0010: 9D C7 FB B7 22 D8 8E E9   18 70 0E 91 6B D2 2D 12  ...."....p..k.-.
#     0020: 21 0B B7 4E 70 92 A1 D9   C2 C1 5C AB 29 5F 82 38  !..Np.....\.)_.8
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.355 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 01:59:23.355 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:23.355 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 01:59:23.356 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:23.356 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 01:59:23.356 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:23.356 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.356 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.358 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 91 64 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 01:59:10.000 UTC",
#       "not  after"         : "2024-01-20 01:59:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#           0010: 87 76 E5 81                                        .v..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 75 C4 24 A0 FE 06 A7   40 56 BC 83 E6 74 0C AC  .u.$....@V...t..
#           0010: 26 D4 5F 30                                        &._0
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6E D4 2D 15",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 01:59:03.000 UTC",
#       "not  after"         : "2024-01-20 01:59:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 98 57 F9 B4 9A 0A F6 6B   21 F8 4A 6B 0A 5C 5C 35  .W.....k!.Jk.\\5
#           0010: 40 8B E3 E0                                        @...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#           0010: 87 76 E5 81                                        .v..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.377 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F FE 91 74 83 CC 0A 7E   5D 1C 8F A5 55 06 C2 C2  _..t....]...U...
#     0010: DA 89 01 2F C1 A2 04 CC   1D D5 3C BB BD BE 54 8F  .../......<...T.
#     0020: 0C 4C 7A 7D FF 12 88 CD   4B FE 54 61 3D B2 1F 8E  .Lz.....K.Ta=...
#     0030: B6 41 19 23 91 81 3A E5   0F 2E 9B 46 5C 37 D7 98  .A.#..:....F\7..
#     0040: 13 A1 E2 5A E9 6A 2F EC   65 5B DA 2B 98 31 83 4B  ...Z.j/.e[.+.1.K
#     0050: 23 9A D3 93 26 A9 3D FE   DD F8 CE C8 5E 02 4B C1  #...&.=.....^.K.
#     0060: 68 26 2D E2 D8 5E 6F F0   C3 00 84 C2 38 D7 7C DD  h&-..^o.....8...
#     0070: BA FC EC 10 1F C5 B1 D0   9D 51 DB B2 83 CA D0 D6  .........Q......
#     0080: C7 C1 F6 A0 E9 31 AF 12   5B 12 43 8C 4B 5B D6 D3  .....1..[.C.K[..
#     0090: 3F B4 03 63 1B CE 36 CF   14 1E 98 81 46 C7 EB 57  ?..c..6.....F..W
#     00A0: A8 4D 53 1B A1 6E B6 38   E3 7F 08 F0 E5 17 FE 4C  .MS..n.8.......L
#     00B0: 7A 1E 67 80 9F CD C9 8A   6E C2 6F 69 21 4E A5 C8  z.g.....n.oi!N..
#     00C0: CA 3D A8 C6 37 E6 D1 96   1C 55 9D 62 BC 34 01 76  .=..7....U.b.4.v
#     00D0: 62 A3 74 9A 8E 97 BC F7   34 61 D8 81 27 1D A0 44  b.t.....4a..'..D
#     00E0: 37 6E 1B AA FD FC FA 49   EB 02 AC 5B 63 78 FB CF  7n.....I...[cx..
#     00F0: BD A3 00 F4 AE EB 73 77   60 F4 7F C2 6E E3 53 5D  ......sw`...n.S]
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.378 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A8 36 3F DE E9 2E BF C0   D0 35 C5 32 2C F2 88 45  .6?......5.2,..E
#     0010: F9 97 2C AA DE 14 62 28   B0 54 79 63 55 AE 18 17  ..,...b(.TycU...
#     0020: 9D 8E 89 AF 10 55 34 57   B8 73 FE 1A 4B D4 3B 20  .....U4W.s..K.;
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.379 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:23.421 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C0 0D BB 35 77 92 AA 52 99 3A 67 63 96 85 72 84 BF 2B BB D8 DE 27 49 7B DA 02 0B B9 79 EA 42 AF",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-22 01:59:23.854 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-22 01:59:23.857 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-22 01:59:25.684; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-22 01:59:25.688; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-22 01:59:26.906; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-gqU7Oa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gqU7Oa/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 01:59:26.908; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5b970f7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-gqU7Oa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gqU7Oa/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-22 01:59:26.910; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fd4acee(ca,h=[localhost],a=[],w=[]) for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-gqU7Oa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gqU7Oa/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-22 01:59:27.005 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 91 64 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 01:59:10.000 UTC",
#     "not  after"         : "2024-01-20 01:59:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#         0010: 87 76 E5 81                                        .v..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 75 C4 24 A0 FE 06 A7   40 56 BC 83 E6 74 0C AC  .u.$....@V...t..
#         0010: 26 D4 5F 30                                        &._0
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6E D4 2D 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 01:59:03.000 UTC",
#     "not  after"         : "2024-01-20 01:59:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 57 F9 B4 9A 0A F6 6B   21 F8 4A 6B 0A 5C 5C 35  .W.....k!.Jk.\\5
#         0010: 40 8B E3 E0                                        @...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#         0010: 87 76 E5 81                                        .v..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 01:59:27.013 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6E D4 2D 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 01:59:03.000 UTC",
#     "not  after"         : "2024-01-20 01:59:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 57 F9 B4 9A 0A F6 6B   21 F8 4A 6B 0A 5C 5C 35  .W.....k!.Jk.\\5
#         0010: 40 8B E3 E0                                        @...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#         0010: 87 76 E5 81                                        .v..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 6F 71 C1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 01:59:02.000 UTC",
#     "not  after"         : "2024-01-20 01:59:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 57 F9 B4 9A 0A F6 6B   21 F8 4A 6B 0A 5C 5C 35  .W.....k!.Jk.\\5
#         0010: 40 8B E3 E0                                        @...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 01:59:27.047 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 01:59:27.532 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 01:59:27.533 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 01:59:27.534 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-22 01:59:27.534 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 01:59:27.539 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 01:59:27.554 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 01:59:27.554 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 01:59:27.555 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-22 01:59:27.559 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5F C0 C9 EC 72 F5 2E 10 75 D1 C2 14 95 EC F2 EC D6 0F 03 6F 53 CA 1F 34 57 9A 90 CD 9D CE 64 B0",
#   "session id"          : "60 35 FB 20 1B 2A 76 F8 21 C4 79 08 2B 1F 6E 30 1A A0 B7 60 CE D0 6F 6B C4 9A 1B 0C D5 E0 AC FD",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 19 0F FD 3C 9D E2 8D 20   69 86 05 27 5D 4C 09 CA  ...<... i..']L..
#             0010: 10 9B 06 0D 97 E0 94 72   9F 34 83 D0 00 CA DA 5A  .......r.4.....Z
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.887 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "EC E3 56 A8 E8 13 30 D0 9C 66 B2 B6 B5 98 F6 FD B7 5E 70 43 4C 3F 7C 92 B7 CA B6 18 BE 23 C2 97",
#   "session id"          : "60 35 FB 20 1B 2A 76 F8 21 C4 79 08 2B 1F 6E 30 1A A0 B7 60 CE D0 6F 6B C4 9A 1B 0C D5 E0 AC FD",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5D B6 F9 A8 1C FE 74 02   79 6D 1A 46 FA 94 D9 5A  ].....t.ym.F...Z
#           0010: AD 5B 1A 7C D8 9F A0 A0   47 41 10 E9 6E 6D C5 46  .[......GA..nm.F
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.888 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.888 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.889 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.889 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.890 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.890 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.890 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.890 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.891 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.891 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.893 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.898 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.898 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.898 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.899 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.899 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.899 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.899 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.900 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.900 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:28.900 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:28.900 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.900 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.900 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.915 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.916 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.917 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.920 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.921 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.921 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.923 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.923 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.923 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.923 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:28.924 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:28.924 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.929 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.929 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.930 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.932 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.932 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.933 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:28.933 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.939 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 51 66 37",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 01:59:06.000 UTC",
#       "not  after"         : "2024-01-20 01:59:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#           0010: 87 76 E5 81                                        .v..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 EF A1 48 CC 16 DA 74   A7 25 74 66 1C AE D3 60  ...H...t.%tf...`
#           0010: D0 B0 FB 3D                                        ...=
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:28.939 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:29.158 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6E D4 2D 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 01:59:03.000 UTC",
#     "not  after"         : "2024-01-20 01:59:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 57 F9 B4 9A 0A F6 6B   21 F8 4A 6B 0A 5C 5C 35  .W.....k!.Jk.\\5
#         0010: 40 8B E3 E0                                        @...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#         0010: 87 76 E5 81                                        .v..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:29.161 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8A 5B B1 95 94 AC 2D 7C   88 C1 61 63 DE 7F 79 04  .[....-...ac..y.
#     0010: 79 A5 11 FD EE 81 53 71   46 79 01 A1 8B 9F FF 70  y.....SqFy.....p
#     0020: F3 02 00 DA F7 09 37 B0   0A 02 20 04 BA 6A 95 EB  ......7... ..j..
#     0030: 6B 56 2F 7A 8B B6 47 83   4D 8A 01 02 93 3A 7C 97  kV/z..G.M....:..
#     0040: AF E8 AA 4C 21 2E E3 EE   28 0D 83 0D B1 2A 4E 26  ...L!...(....*N&
#     0050: 7E 7C 4B FE 24 7C A9 33   AE 27 6B E8 0A 96 BC 54  ..K.$..3.'k....T
#     0060: 83 CB 20 16 25 05 09 FA   C6 DC 9C BA 0E A9 83 20  .. .%..........
#     0070: 99 85 78 A8 C6 64 A5 4A   F4 9A D7 B6 B5 20 4D D2  ..x..d.J..... M.
#     0080: 3F 24 DC E6 9E 8B 50 90   23 83 06 9C AB 92 B6 52  ?$....P.#......R
#     0090: 6C 83 F0 59 DB AB B2 4D   9D 25 23 FF FE B4 F5 D8  l..Y...M.%#.....
#     00A0: 6A 32 05 D0 95 CD 4F A7   FC 27 ED 96 3E AB 21 0B  j2....O..'..>.!.
#     00B0: F3 14 07 69 03 2F 0C B9   2B 48 AD A8 D2 6E 56 7A  ...i./..+H...nVz
#     00C0: 30 BC 39 4C EE 9D 5B E2   B8 D8 61 F7 C9 83 A6 49  0.9L..[...a....I
#     00D0: 10 76 6C EB 2D 83 18 44   D6 D8 8B AB A5 E2 7B 4B  .vl.-..D.......K
#     00E0: 75 CB 16 5D D1 CB 5D A9   A9 A7 AD 31 35 55 61 1A  u..]..]....15Ua.
#     00F0: 87 42 DD 31 26 50 19 E6   C2 37 2F 34 C3 27 B7 91  .B.1&P...7/4.'..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:29.162 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 40 3B 6D 60 75 2C CB 97   23 EA 63 98 A5 56 7C 96  @;m`u,..#.c..V..
#     0010: 96 94 24 AB 7F 1E 97 98   8B 58 B4 24 AB 9E B7 A7  ..$......X.$....
#     0020: 13 43 1B AD 75 5E 25 4B   48 1A FA 96 97 7A 25 FA  .C..u^%KH....z%.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:29.163 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 01:59:29.164 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:29.164 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 01:59:29.164 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:29.164 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-22 01:59:29.165 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-22 01:59:29.165 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:29.165 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:29.166 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 91 64 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 01:59:10.000 UTC",
#       "not  after"         : "2024-01-20 01:59:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#           0010: 87 76 E5 81                                        .v..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 75 C4 24 A0 FE 06 A7   40 56 BC 83 E6 74 0C AC  .u.$....@V...t..
#           0010: 26 D4 5F 30                                        &._0
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6E D4 2D 15",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 01:59:03.000 UTC",
#       "not  after"         : "2024-01-20 01:59:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 98 57 F9 B4 9A 0A F6 6B   21 F8 4A 6B 0A 5C 5C 35  .W.....k!.Jk.\\5
#           0010: 40 8B E3 E0                                        @...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#           0010: 87 76 E5 81                                        .v..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:29.186 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2C 9E CE B9 EE 3F AE EE   90 9B 4C 40 6B 51 4C 9C  ,....?....L@kQL.
#     0010: 5B 00 02 16 B3 93 CB F8   E9 15 1E 52 24 41 90 C7  [..........R$A..
#     0020: C1 2A 72 C6 8B CA 5F 28   C5 05 1B D6 48 CF 2A 8B  .*r..._(....H.*.
#     0030: 99 EE 0D 48 79 54 E7 C8   57 76 2F A7 C8 82 A2 A9  ...HyT..Wv/.....
#     0040: 5C 4B 71 4B A7 4B 8B FA   BE 3D C6 0E B9 1A 99 A9  \KqK.K...=......
#     0050: 86 14 2C 08 31 55 14 C5   CF 56 0F E9 E3 AF C5 52  ..,.1U...V.....R
#     0060: 17 5B EA F7 F1 B7 D7 F8   27 3D 68 5D 24 9F CB E5  .[......'=h]$...
#     0070: 36 E4 56 9C EA 48 71 95   02 55 27 E2 B6 A7 75 01  6.V..Hq..U'...u.
#     0080: 2C FE 9D 0C 25 E5 11 09   CC 0C EF EA CF F1 EB 5A  ,...%..........Z
#     0090: FD 4C F2 9D 0D 26 70 D3   80 FB 9D A3 3D C4 8F 97  .L...&p.....=...
#     00A0: CE 2C C4 7F 41 F8 79 51   4D 40 EF C9 3E AA 7E 44  .,..A.yQM@..>..D
#     00B0: 93 9C 10 37 11 32 70 CE   22 BB CB 11 56 DC 70 4D  ...7.2p."...V.pM
#     00C0: 57 E3 D5 42 EC A6 F8 CA   B4 7B 93 EE 0D B3 69 AF  W..B..........i.
#     00D0: 6D 7E 4A FB A5 F1 40 80   81 9D 89 A6 98 0E C7 2E  m.J...@.........
#     00E0: 4C 9B A4 2D 1C 40 1D 58   ED 62 59 C3 E4 A8 BF 50  L..-.@.X.bY....P
#     00F0: 50 5C 48 F7 0E 06 FD 88   BC 88 25 83 08 F3 84 79  P\H.......%....y
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:29.187 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F4 05 E8 0A 00 B5 C3 51   48 48 9D 01 4F AB 6D E2  .......QHH..O.m.
#     0010: EE 6A AA 31 06 2E E2 44   69 D2 7B D6 1A 97 54 84  .j.1...Di.....T.
#     0020: 54 4C 84 50 59 C4 00 73   58 CC 3A AF 9C A5 7D 78  TL.PY..sX.:....x
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:29.187 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 01:59:29.246 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 01:59:29.246 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 01:59:29.246 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-22 01:59:29.246 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-22 01:59:29.272 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C8 D6 BC 08 EA F4 B2 3A 24 BB 54 BC AE A1 05 5C 40 3E 1F F4 C6 B9 14 25 21 D4 2B 7D 9A 45 3D FC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-22 01:59:29.515 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-22 01:59:29.515 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (167 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-22 01:59:30.549; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-22 01:59:30.553; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-22 01:59:31.165 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 91 64 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 01:59:10.000 UTC",
#       "not  after"         : "2024-01-20 01:59:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#           0010: 87 76 E5 81                                        .v..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 75 C4 24 A0 FE 06 A7   40 56 BC 83 E6 74 0C AC  .u.$....@V...t..
#           0010: 26 D4 5F 30                                        &._0
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6E D4 2D 15",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 01:59:03.000 UTC",
#       "not  after"         : "2024-01-20 01:59:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 98 57 F9 B4 9A 0A F6 6B   21 F8 4A 6B 0A 5C 5C 35  .W.....k!.Jk.\\5
#           0010: 40 8B E3 E0                                        @...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BA DE 14 E4 ED 6E 08 BF   DF 04 24 2F 94 0E CF 4A  .....n....$/...J
#           0010: 87 76 E5 81                                        .v..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-22 01:59:31.169 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6E D4 2D 15",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-22 01:59:03.000 UTC",
#       "not  after"         : "2024-01-20 01:59:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#     

[...truncated too long message...]

           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 EE 96 F4 71 C1 08 C9   AA 81 EA 53 41 C0 30 11  ....q......SA.0.
#         0010: 7F 14 E3 FC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 02:00:13.244 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 5F 75 3E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 01:59:40.000 UTC",
#     "not  after"         : "2024-01-20 01:59:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 79 63 88 3F 79 4A 61   6D 0C F9 3F 7C B1 E5 94  .yc.?yJam..?....
#         0010: 0D E9 E9 1F                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 A1 D2 C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-22 01:59:42.000 UTC",
#     "not  after"         : "2024-01-20 01:59:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 79 63 88 3F 79 4A 61   6D 0C F9 3F 7C B1 E5 94  .yc.?yJam..?....
#         0010: 0D E9 E9 1F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E3 D4 A9 EA 2B F3 44 6B   5E 37 41 69 C3 E5 4C 36  ....+.Dk^7Ai..L6
#         0010: B5 53 EE E2                                        .S..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-22 02:00:13.254 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14002ms
ok 65 stop command for single port in 16493ms
not ok 66 status detects locally running solr in 2225ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 19601 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 15695 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 19601 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 15695 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 3639ms
ok 69 copying files around in 9283ms
ok 70 upconfig in 2703ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1211ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1218ms
not ok 73 Cleanup in 3215ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 19601 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 15695 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 19601 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 15695 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 18s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/jublricuol5ik

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 872 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/872/

All tests passed

Build Log:
[...truncated 1170 lines...]
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-21 16:51:20.942; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 16:51:22.095; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 3406ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-21 16:51:24.355; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 16:51:25.517; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 3396ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-21 16:51:27.792; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 16:51:28.949; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2342ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-21 16:51:31.261; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 16:51:31.316; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 25378ms
ok 19 Check export command in 22234ms
ok 20 export fails on non cloud mode in 8792ms
not ok 21 using curl to extract a single pdf file in 8859ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 37975 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37975 (pid=15276). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-21 16:52:36.807; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 16:52:36.856; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 9165ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 37975 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37975 (pid=15697). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-21 16:52:45.973; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 16:52:46.037; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 10237ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 37975 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37975 (pid=16217). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-21 16:52:55.129; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 16:52:56.293; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30443ms
ok 25 start help flag prints help in 177ms
ok 26 stop help flag prints help in 182ms
ok 27 restart help flag prints help in 189ms
ok 28 status help flag prints help in 56ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 170ms
ok 30 create help flag prints help in 169ms
ok 31 createcore help flag prints help in 173ms
ok 32 createcollection help flag prints help in 173ms
ok 33 delete help flag prints help in 171ms
ok 34 version help flag prints help in 56ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 181ms
ok 36 auth help flag prints help in 174ms
ok 37 assert help flag prints help in 986ms
ok 38 post help flag prints help in 965ms
not ok 39 SQL Module in 10094ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:37975/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-21 16:53:41.119; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 16:53:41.178; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:37975/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 22504ms
not ok 41 icu collation in analysis-extras module in 9617ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-21 16:54:12.175; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 16:54:13.343; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1325ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 19601 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 19601 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9907ms
ok 44 deploying and undeploying a collection level package in 13561ms
ok 45 Affinity placement plugin using sysprop in 15863ms
ok 46 Random placement plugin using ENV in 15909ms
ok 47 Check help command in 4017ms
ok 48 basic post with a type specified in 5673ms
ok 49 basic post WITHOUT a type specified in 12345ms
ok 50 crawling a directory in 4656ms
ok 51 crawling a web site in 4911ms
ok 52 commit and optimize and delete in 4131ms
ok 53 args mode in 6622ms
ok 54 stdin mode in 3436ms
ok 55 post solr log into solr via script in 10078ms
ok 56 post solr log into solr via cli in 7283ms
ok 57 allowPaths - backup in 17635ms
ok 58 start solr with ssl in 18116ms
ok 59 use different hostname when not checking peer-name in 31365ms
ok 60 start solr with ssl and auth in 17135ms
ok 61 start solr with client truststore and security manager in 19219ms
ok 62 start solr with mTLS needed in 66325ms
ok 63 start solr with mTLS wanted in 51580ms
ok 64 SOLR-11740 check 'solr stop' connection in 15127ms
ok 65 stop command for single port in 17119ms
not ok 66 status detects locally running solr in 2623ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 19601 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 15695 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 19601 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 15695 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 248ms
ok 68 listing out files in 3913ms
ok 69 copying files around in 12086ms
ok 70 upconfig in 5032ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1224ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1228ms
not ok 73 Cleanup in 3647ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 19601 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 15695 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 19601 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 15695 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 3s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/xpjm4jjbwesi4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 871 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/871/

All tests passed

Build Log:
[...truncated 1303 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1246ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1240ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1254ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1333ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1329ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1349ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 55 post solr log into solr via script in 10128ms
ok 56 post solr log into solr via cli in 7466ms
ok 57 allowPaths - backup in 17336ms
ok 58 start solr with ssl in 18130ms
ok 59 use different hostname when not checking peer-name in 31402ms
ok 60 start solr with ssl and auth in 16599ms
ok 61 start solr with client truststore and security manager in 19002ms
ok 62 start solr with mTLS needed in 65086ms
not ok 63 start solr with mTLS wanted in 37168ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 475)
#   `assert_output --partial "Created collection 'test'"' failed
# /tmp/bats-run-htdyJr/test/63/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 34267 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34267 (pid=10570). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 34268 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 34268 (pid=10726). Happy searching!
#
#     INFO  - 2023-10-21 12:34:17.237; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-21 12:34:17.242; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-21 12:34:18.149; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1536602f(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-htdyJr/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-htdyJr/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-21 12:34:18.154; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-htdyJr/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-htdyJr/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-21 12:34:18.156; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(ca,h=[localhost],a=[],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-htdyJr/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-htdyJr/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-21 12:34:18.221 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6A 05 F1 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 12:34:05.000 UTC",
#     "not  after"         : "2024-01-19 12:34:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 3C 66 F6 DF 0B CD 23   B7 4C 49 12 E6 34 CA 6B  v<f....#.LI..4.k
#         0010: 51 1C B4 A0                                        Q...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E F7 EC 1A 72 B3 B3 50   6D 83 93 AB 02 DF 61 F7  ....r..Pm.....a.
#         0010: 3F DC 0B F8                                        ?...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-21 12:34:18.229 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 CC 99 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 12:33:58.000 UTC",
#     "not  after"         : "2024-01-19 12:33:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E CC 1C 38 A9 BF 6E 3B   45 B1 37 51 F8 45 E0 2D  ...8..n;E.7Q.E.-
#         0010: 04 3D 43 DF                                        .=C.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 3C 66 F6 DF 0B CD 23   B7 4C 49 12 E6 34 CA 6B  v<f....#.LI..4.k
#         0010: 51 1C B4 A0                                        Q...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 5B 6A A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 12:33:56.000 UTC",
#     "not  after"         : "2024-01-19 12:33:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E CC 1C 38 A9 BF 6E 3B   45 B1 37 51 F8 45 E0 2D  ...8..n;E.7Q.E.-
#         0010: 04 3D 43 DF                                        .=C.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-21 12:34:18.250 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-21 12:34:18.842 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 12:34:18.842 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-21 12:34:18.857 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-21 12:34:18.857 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 12:34:18.866 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 12:34:18.889 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 12:34:18.890 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 12:34:18.890 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 12:34:18.897 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "FF 76 29 C4 E8 A3 9E 4C 50 AB DC 10 4A 20 F3 C4 53 DA A0 85 94 E7 D1 38 38 46 ED 6B 31 04 70 2F",
#   "session id"          : "3B 71 B3 E6 F7 A3 E3 8B 7B A6 CB E9 6C EB 58 00 8A 19 EC 54 B2 73 1D A8 29 B4 D9 B2 76 5D 78 E4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 48 C4 6A 80 E6 8B 90 02   A2 8E 4E 14 72 7D BD C9  H.j.......N.r...
#             0010: 10 E4 4E B5 73 8C AB 6A   9C EB E9 6C E6 78 86 48  ..N.s..j...l.x.H
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-21 12:34:18.918 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-21 12:34:18.918 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-21 12:34:18.918 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-21 12:34:18.918 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.078 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A1 D6 42 3C B9 68 3D 52 DA 71 F2 95 CE 60 2D 8D 1C F2 DD 00 09 5C 77 B0 44 4D 14 E4 D5 E8 D5 15",
#   "session id"          : "3B 71 B3 E6 F7 A3 E3 8B 7B A6 CB E9 6C EB 58 00 8A 19 EC 54 B2 73 1D A8 29 B4 D9 B2 76 5D 78 E4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E0 3F 77 9D D9 CF FC C7   38 C4 20 02 3F F4 B4 85  .?w.....8. .?...
#           0010: 38 82 2D B8 B7 F0 55 0C   AC C5 1B 50 18 73 E0 2E  8.-...U....P.s..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.078 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.078 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.079 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.079 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.079 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.081 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.081 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.081 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.081 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.081 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.083 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.083 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.083 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.084 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.084 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:19.084 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:19.084 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.084 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.084 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.099 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.100 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.101 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.115 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.115 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.115 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.116 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.116 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.116 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.116 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:19.116 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:19.116 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.117 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.117 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.118 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.118 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.133 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.540 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:19.540 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.545 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 B2 21 6A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-21 12:34:01.000 UTC",
#       "not  after"         : "2024-01-19 12:34:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 3C 66 F6 DF 0B CD 23   B7 4C 49 12 E6 34 CA 6B  v<f....#.LI..4.k
#           0010: 51 1C B4 A0                                        Q...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E 89 32 6E DE 09 A1 DD   D5 AA 94 CF 6D 79 B8 01  >.2n........my..
#           0010: 69 78 0B C0                                        ix..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.546 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.645 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 CC 99 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 12:33:58.000 UTC",
#     "not  after"         : "2024-01-19 12:33:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E CC 1C 38 A9 BF 6E 3B   45 B1 37 51 F8 45 E0 2D  ...8..n;E.7Q.E.-
#         0010: 04 3D 43 DF                                        .=C.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 3C 66 F6 DF 0B CD 23   B7 4C 49 12 E6 34 CA 6B  v<f....#.LI..4.k
#         0010: 51 1C B4 A0                                        Q...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.648 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 29 6D 81 E1 B8 5B 75 E4   3E 0E F5 18 0B EE AA E2  )m...[u.>.......
#     0010: 06 2B 7A AB B7 AC 20 6F   0D 58 F5 1A DD 1A 9D 90  .+z... o.X......
#     0020: 19 24 18 B3 98 18 05 46   BA 1F 77 BD A7 7B B4 B5  .$.....F..w.....
#     0030: 19 4D 8B 2B 26 90 F9 47   44 99 15 C4 4B 16 35 F2  .M.+&..GD...K.5.
#     0040: C7 B6 E2 90 03 F2 40 50   CC CE 3B D5 E6 52 D7 5B  ......@P..;..R.[
#     0050: 1F C1 DB FB 00 9C 52 0C   63 D1 4D D9 16 A5 7A 09  ......R.c.M...z.
#     0060: 0D 42 DE 03 F3 73 9D 02   6E 5C 76 A6 4C 47 94 31  .B...s..n\v.LG.1
#     0070: C4 53 99 77 A4 74 78 95   6C 6A 88 7B A3 98 47 8A  .S.w.tx.lj....G.
#     0080: 2D AD 03 6E 16 1B 86 51   64 52 06 3C F8 C9 96 CB  -..n...QdR.<....
#     0090: E5 9F BC DD 16 6A 6F C3   11 61 D3 E7 A0 EE 80 65  .....jo..a.....e
#     00A0: B9 C8 AA 51 E4 68 8F D6   0C DA 55 41 71 1E DE 62  ...Q.h....UAq..b
#     00B0: 35 30 40 88 B4 CF DF 4B   93 B4 BE 01 C6 4D 84 51  50@....K.....M.Q
#     00C0: F4 A4 84 7E 58 4E 43 82   EC B8 EB FA 47 FF FE 9A  ....XNC.....G...
#     00D0: 67 8B 29 7C C7 46 54 8E   CD 00 CE 22 68 82 1F 4C  g.)..FT...."h..L
#     00E0: 01 1C B5 0A C5 6A 27 EA   1D 28 1A 04 CB 74 28 60  .....j'..(...t(`
#     00F0: 77 5B A1 A6 1A B2 D0 41   29 40 34 5C AA 49 06 FE  w[.....A)@4\.I..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.650 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 65 F0 71 EF F6 01 82 D5   A9 45 E3 11 41 86 22 C9  e.q......E..A.".
#     0010: 25 4C 0D 57 10 3F 19 A6   6F C1 6C A8 5A B6 80 8C  %L.W.?..o.l.Z...
#     0020: BE 04 35 27 38 36 D8 C5   69 59 16 9D 9B BF 23 37  ..5'86..iY....#7
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.654 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-21 12:34:19.655 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:19.655 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-21 12:34:19.655 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:19.655 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-21 12:34:19.655 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:19.655 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.656 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.660 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6A 05 F1 33",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-21 12:34:05.000 UTC",
#       "not  after"         : "2024-01-19 12:34:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 3C 66 F6 DF 0B CD 23   B7 4C 49 12 E6 34 CA 6B  v<f....#.LI..4.k
#           0010: 51 1C B4 A0                                        Q...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E F7 EC 1A 72 B3 B3 50   6D 83 93 AB 02 DF 61 F7  ....r..Pm.....a.
#           0010: 3F DC 0B F8                                        ?...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.704 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 28 C2 21 39 AD 1F E3 49   FB 9C F4 0B EC 82 EF 55  (.!9...I.......U
#     0010: BD 87 EE DC EE 60 D9 96   EB D2 CD D1 F9 55 9F 3B  .....`.......U.;
#     0020: AE 12 5C 76 57 3B 3E CA   CA 21 63 FB FF 40 D2 65  ..\vW;>..!c..@.e
#     0030: 4F 0F D0 A5 AE BA 67 5E   65 9F F6 ED 09 3D 15 E5  O.....g^e....=..
#     0040: BD C7 B6 65 DA 35 6C 14   4D BB 3F 42 29 6F 1D 13  ...e.5l.M.?B)o..
#     0050: 0F E6 48 0F F7 3B 7B 3D   96 5C B8 70 CA 5C 12 09  ..H..;.=.\.p.\..
#     0060: 15 99 33 AC 99 3F E2 D7   4C 1D 47 09 C9 08 B8 43  ..3..?..L.G....C
#     0070: F9 AF 49 3B A2 54 6A 84   9F 07 30 9C A0 A8 C5 1E  ..I;.Tj...0.....
#     0080: 9A 0C 3E A7 8C 15 C8 11   62 61 0B E4 A9 D4 BB A6  ..>.....ba......
#     0090: AA 2A C6 7D FD FC D7 42   F4 63 6D E4 47 AC 3F D1  .*.....B.cm.G.?.
#     00A0: 5B A5 9A 52 67 16 39 79   0B 0A E2 65 53 E6 3D 69  [..Rg.9y...eS.=i
#     00B0: 63 6A 39 D7 24 2D 53 4D   9D 20 3A 0D 16 C7 D0 23  cj9.$-SM. :....#
#     00C0: F3 C8 CE A7 34 7E 5D 96   20 15 44 45 09 23 6B EC  ....4.]. .DE.#k.
#     00D0: EE 13 42 F4 D7 BF 94 6B   A1 CC 3A B2 2F A3 7B 52  ..B....k..:./..R
#     00E0: 29 40 D4 A8 1B FA 1C D5   69 C1 BB 48 67 E9 28 59  )@......i..Hg.(Y
#     00F0: 38 13 AF 38 95 3C 3F 22   B3 43 4C 38 CD 9E 59 65  8..8.<?".CL8..Ye
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.705 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0A D1 43 B6 62 AC 7F 8C   27 CB 67 8B F5 CA B1 63  ..C.b...'.g....c
#     0010: A3 EA 17 17 17 28 E7 6D   D4 2A 03 18 A6 B5 BF A2  .....(.m.*......
#     0020: 70 75 77 24 97 A5 6E 13   8A FD 69 67 B8 83 7A CB  puw$..n...ig..z.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:19.710 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-21 12:34:19.815 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "84 4E 44 8C 8E 2E 45 2E 08 36 7F 98 6D 51 0E EA C2 32 17 24 1E C0 CD B3 98 A2 0C D5 BD C2 D2 C2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-21 12:34:20.111 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|0E|h2sc-1-thread-2|2023-10-21 12:34:20.119 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-21 12:34:20.131 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-21 12:34:21.609; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-21 12:34:21.613; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-21 12:34:22.005; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-htdyJr/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-htdyJr/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-21 12:34:22.009; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-htdyJr/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-htdyJr/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-21 12:34:22.010; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-htdyJr/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-htdyJr/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-21 12:34:22.049 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6A 05 F1 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 12:34:05.000 UTC",
#     "not  after"         : "2024-01-19 12:34:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 3C 66 F6 DF 0B CD 23   B7 4C 49 12 E6 34 CA 6B  v<f....#.LI..4.k
#         0010: 51 1C B4 A0                                        Q...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E F7 EC 1A 72 B3 B3 50   6D 83 93 AB 02 DF 61 F7  ....r..Pm.....a.
#         0010: 3F DC 0B F8                                        ?...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-21 12:34:22.053 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 CC 99 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 12:33:58.000 UTC",
#     "not  after"         : "2024-01-19 12:33:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E CC 1C 38 A9 BF 6E 3B   45 B1 37 51 F8 45 E0 2D  ...8..n;E.7Q.E.-
#         0010: 04 3D 43 DF                                        .=C.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 3C 66 F6 DF 0B CD 23   B7 4C 49 12 E6 34 CA 6B  v<f....#.LI..4.k
#         0010: 51 1C B4 A0                                        Q...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 5B 6A A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 12:33:56.000 UTC",
#     "not  after"         : "2024-01-19 12:33:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E CC 1C 38 A9 BF 6E 3B   45 B1 37 51 F8 45 E0 2D  ...8..n;E.7Q.E.-
#         0010: 04 3D 43 DF                                        .=C.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-21 12:34:22.065 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-21 12:34:22.393 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 12:34:22.394 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-21 12:34:22.395 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-21 12:34:22.395 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 12:34:22.399 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 12:34:22.410 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 12:34:22.410 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 12:34:22.410 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 12:34:22.412 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "74 7E DF C8 5C 62 F5 DE D1 B5 3F 40 E9 59 8B FF AF 4C A9 43 07 9D A7 72 47 ED F2 91 0D EA C6 D9",
#   "session id"          : "7D C2 91 50 99 90 23 EA 46 F7 15 5A 73 97 FF 95 1A 66 52 18 0D E4 B3 A2 31 25 67 08 89 C8 E6 E0",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 05 1A 40 A1 DB F9 CF E6   CE 93 05 2F BD 95 C9 D4  ..@......../....
#             0010: 7F AB 1A DC 31 C1 B1 08   1A 10 5B 6A B0 DE A6 29  ....1.....[j...)
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.505 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "80 87 C2 B6 65 BF 88 22 BC 38 39 9E FA F1 63 D8 CE 51 5E 99 9A 7D FD AA 01 CC 54 3A C9 9D 32 E1",
#   "session id"          : "7D C2 91 50 99 90 23 EA 46 F7 15 5A 73 97 FF 95 1A 66 52 18 0D E4 B3 A2 31 25 67 08 89 C8 E6 E0",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 78 4E 10 DF 7A 09 EE E1   D4 91 C0 2D 0F 02 2B 0E  xN..z......-..+.
#           0010: 14 A1 BB 57 B4 99 91 C9   E8 24 E4 B5 4E 80 25 3A  ...W.....$..N.%:
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.505 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.506 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.508 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.508 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.508 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.509 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.509 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.510 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.510 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.510 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.513 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.513 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:22.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:22.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.526 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.528 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.529 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.533 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.533 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.533 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.533 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.535 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.535 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.535 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:22.536 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:22.536 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.537 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.537 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.537 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.537 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.538 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.540 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:22.540 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.545 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 B2 21 6A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-21 12:34:01.000 UTC",
#       "not  after"         : "2024-01-19 12:34:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 3C 66 F6 DF 0B CD 23   B7 4C 49 12 E6 34 CA 6B  v<f....#.LI..4.k
#           0010: 51 1C B4 A0                                        Q...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E 89 32 6E DE 09 A1 DD   D5 AA 94 CF 6D 79 B8 01  >.2n........my..
#           0010: 69 78 0B C0                                        ix..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.545 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.598 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 CC 99 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 12:33:58.000 UTC",
#     "not  after"         : "2024-01-19 12:33:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E CC 1C 38 A9 BF 6E 3B   45 B1 37 51 F8 45 E0 2D  ...8..n;E.7Q.E.-
#         0010: 04 3D 43 DF                                        .=C.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 3C 66 F6 DF 0B CD 23   B7 4C 49 12 E6 34 CA 6B  v<f....#.LI..4.k
#         0010: 51 1C B4 A0                                        Q...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.601 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7E 98 DE 54 11 AD 95 C3   87 C7 8B 58 A9 6A EC 35  ...T.......X.j.5
#     0010: A9 74 9B EA 0B 0A F9 D2   C4 0C 74 29 B5 1D EE 82  .t........t)....
#     0020: DD B1 7E 00 48 A9 62 AD   3B 69 25 F7 3F 48 29 6E  ....H.b.;i%.?H)n
#     0030: 56 70 DB CD 47 80 CC 18   22 C8 AD E0 35 8C 6E C1  Vp..G..."...5.n.
#     0040: 5C 8C DD 70 A9 99 E4 16   3F 49 7B A7 94 9D 73 31  \..p....?I....s1
#     0050: FD 89 EC 14 2D 02 47 B9   A2 41 8F AD FF 26 6C 56  ....-.G..A...&lV
#     0060: 01 EE E8 7A 26 1C 90 1E   2B 92 4C CF ED 21 75 41  ...z&...+.L..!uA
#     0070: 0C AD 7D 9B 6A D3 F7 94   64 45 9F 83 1F 18 1E F0  ....j...dE......
#     0080: 96 90 D3 58 7F 1E 92 02   04 5E 00 13 ED 98 61 E7  ...X.....^....a.
#     0090: 70 02 FB F3 8D A3 D2 EA   CE D2 3F 35 84 00 04 D4  p.........?5....
#     00A0: 0A B5 43 82 6C 34 43 39   07 63 CC B5 FB AD C3 79  ..C.l4C9.c.....y
#     00B0: FB EE 8B AC 93 CF FA 51   29 96 EB 5D 13 FE 02 A1  .......Q)..]....
#     00C0: 76 56 41 B7 F8 E4 D1 20   BA CC 09 82 ED 40 95 C7  vVA.... .....@..
#     00D0: 62 1D 79 7F ED 25 F4 D9   F7 51 67 E8 AA 89 FC B0  b.y..%...Qg.....
#     00E0: 24 46 F3 30 1D D1 9B DF   46 D7 5D C4 B9 22 52 C5  $F.0....F.].."R.
#     00F0: 89 99 A2 E8 8E 44 3B BC   AC 1D 72 E5 27 B0 74 F8  .....D;...r.'.t.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.603 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 88 CD 93 F4 2B F1 FD E9   32 98 01 9E 98 E8 74 B4  ....+...2.....t.
#     0010: 41 93 E3 24 8E 6B E8 42   4F 44 82 80 1B FE B4 AE  A..$.k.BOD......
#     0020: 0C 55 D1 2A 7E E6 E6 83   ED 1C 18 EA CD 33 14 34  .U.*.........3.4
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.604 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-21 12:34:22.605 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:22.605 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-21 12:34:22.605 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:22.606 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-21 12:34:22.606 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 12:34:22.606 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.606 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.607 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6A 05 F1 33",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-21 12:34:05.000 UTC",
#       "not  after"         : "2024-01-19 12:34:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 3C 66 F6 DF 0B CD 23   B7 4C 49 12 E6 34 CA 6B  v<f....#.LI..4.k
#           0010: 51 1C B4 A0                                        Q...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E F7 EC 1A 72 B3 B3 50   6D 83 93 AB 02 DF 61 F7  ....r..Pm.....a.
#           0010: 3F DC 0B F8                                        ?...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.630 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 89 54 0A 75 72 F8 2E 62   ED 69 39 6B A1 76 2C DB  .T.ur..b.i9k.v,.
#     0010: 0A EC 0F 4D 2A 08 0E 3F   88 2B CC CA 14 C8 AE E7  ...M*..?.+......
#     0020: 2C 04 26 61 CC 50 03 2E   A2 31 65 08 A6 E9 37 C2  ,.&a.P...1e...7.
#     0030: 8C 3D 33 16 6C 68 91 75   2C EF A0 80 D3 02 7B BA  .=3.lh.u,.......
#     0040: 93 A0 36 EE EC 51 BB D1   28 16 B3 80 FD 43 57 DA  ..6..Q..(....CW.
#     0050: C2 58 56 73 1B DF C7 CC   47 90 B0 1F 6C 68 85 E5  .XVs....G...lh..
#     0060: 37 91 7C 0F 7A 21 3A B5   82 59 9A 76 E4 2B EC 61  7...z!:..Y.v.+.a
#     0070: 79 9E 37 B7 35 30 99 33   60 10 FF EA E6 CC B1 F1  y.7.50.3`.......
#     0080: C0 FB 4A BB 86 E7 F9 69   20 D4 13 0A 2C 35 B0 8F  ..J....i ...,5..
#     0090: A9 7E 65 FB 9B 18 5A 99   13 66 87 EC 13 AF 37 4E  ..e...Z..f....7N
#     00A0: 37 C6 25 38 76 52 E4 1A   13 0D F5 EB BC FF AC 07  7.%8vR..........
#     00B0: 6F 7D 79 88 9B 4C EF AB   3C 25 85 6B 91 6C 08 D3  o.y..L..<%.k.l..
#     00C0: 3D 13 BA 94 2D EC 17 D7   AE EF 55 71 C3 8F 08 83  =...-.....Uq....
#     00D0: F6 16 AA 73 3C 93 2C C6   B5 2D 83 9A C2 B5 18 66  ...s<.,..-.....f
#     00E0: EA C0 AB 05 1F 83 85 37   AA 25 60 B1 42 44 4F 15  .......7.%`.BDO.
#     00F0: E9 52 D5 DD 23 3C A5 43   5D 7B 64 C5 CF 08 1D 3F  .R..#<.C].d....?
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.631 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 75 18 8F 98 0D 46 67 D8   C4 21 A5 0B 98 41 33 35  u....Fg..!...A35
#     0010: 44 21 8A B0 8E A8 44 1E   AA B9 45 18 A4 3D 38 B9  D!....D...E..=8.
#     0020: 83 2E 96 83 70 5F BE 23   D7 71 57 B3 62 F6 21 21  ....p_.#.qW.b.!!
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 12:34:22.632 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-21 12:34:22.711 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "61 A0 CA 14 FE 1F DE DF FF 8A 52 D1 38 6A 79 90 E7 EA AC 7F 0D 94 0C 5B F6 20 60 E6 9F 93 BC FC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-21 12:34:22.911 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-21 12:34:22.912 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (135 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-21 12:34:23.824; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-21 12:34:23.829; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-21 12:34:24.265 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6A 05 F1 33",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-21 12:34:05.000 UTC",
#       "not  after"         : "2024-01-19 12:34:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 3C 66 F6 DF 0B CD 23   B7 4C 49 12 E6 34 CA 6B  v<f....#.LI..4.k
#           0010: 51 1C B4 A0                                        Q...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E F7 EC 1A 72 B3 B3 50   6D 83 93 AB 02 DF 61 F7  ....r..Pm.....a.
#           0010: 3F DC 0B F8                                        ?...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-21 12:34:24.270 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "12 CC 99 88",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-21 12:33:58.000 UTC",
#       "not  after"         : "2024-01-19 12:33:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E CC 1C 38 A9 BF 6E 3B   45 B1 37 51 F8 45 E0 2D  ...8..n;E.7Q.E.-
#           0010: 04 3D 43 DF                                        .=C.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 3C 66 F6 DF 0B CD 23   B7 4C 49 12 E6 34 CA 6B  v<f....#.LI..4.k
#           0010: 51 1C B4 A0                                        Q...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 5B 6A A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-21 12:33:56.000 UTC",
#       "not  after"         : "2024-01-19 12:33:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E CC 1C 38 A9 BF 6E 3B   45 B1 37 51 F8 45 E0 2D  ...8..n;E.7Q.E.-
#           0010: 04 3D 43 DF                                        .=C.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-21 12:34:24.281 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-21 12:34:24.381 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-21 12:34:24.381 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-21 12:34:24.381 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-21 12:34:24.381 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/63-6
# Last output:
# INFO  - 2023-10-21 12:34:26.013; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-21 12:34:26.017; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# javax.net.ssl|DEBUG|01|main|2023-10-21 12:34:26.396 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6A 05 F1 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 12:34:05.000 UTC",
#     "not  after"         : "2024-01-19 12:34:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 3C 66 F6 DF 0B CD 23   B7 4C 49 12 E6 34 CA 6B  v<f....#.LI..4.k
#         0010: 51 1C B4 A0                                        Q...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E F7 EC 1A 72 B3 B3 50   6D 83 93 AB 02 DF 61 F7  ....r..Pm.....a.
#         0010: 3F DC 0B F8                                        ?...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-21 12:34:26.400 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 CC 99 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 12:33:58.000 UTC",
#     "not  after"         : "2024-01-19 12:33:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E CC 1C 38 A9 BF 6E 3B   45 B1 37 51 F8 45 E0 2D  ...8..n;E.7Q.E.-
#         0010: 04 3D 43 DF                                        .=C.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 3C 66 F6 DF 0B CD 23   B7 4C 49 12 E6 34 CA 6B  v<f....#.LI..4.k
#         0010: 51 1C B4 A0                                        Q...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 5B 6A A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 12:33:56.000 UTC",
#     "not  after"         : "2024-01-19 12:33:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E CC 1C 38 A9 BF 6E 3B   45 B1 37 51 F8 45 E0 2D  ...8..n;E.7Q.E.-
#         0010: 04 3D 43 DF                                        .=C.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-21 12:34:26.412 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14763ms
ok 65 stop command for single port in 17505ms
not ok 66 status detects locally running solr in 1460ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 15695 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 15695 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 245ms
ok 68 listing out files in 3760ms
ok 69 copying files around in 9730ms
ok 70 upconfig in 2842ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1228ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1223ms
not ok 73 Cleanup in 2490ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 15695 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 15695 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 20s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/in6tnrvfskwyw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 870 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/870/

All tests passed

Build Log:
[...truncated 1174 lines...]
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-21 04:04:38.979; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 04:04:44.553; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2314ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-21 04:04:46.871; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 04:04:46.924; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 3419ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-21 04:04:49.204; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 04:04:50.368; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2363ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-21 04:04:52.708; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 04:04:52.761; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 26241ms
ok 19 Check export command in 22581ms
ok 20 export fails on non cloud mode in 8761ms
not ok 21 using curl to extract a single pdf file in 8933ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 41171 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41171 (pid=15674). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-21 04:05:59.498; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 04:05:59.549; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 10865ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 41171 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41171 (pid=16208). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-21 04:06:08.138; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 04:06:10.395; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 10632ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 41171 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41171 (pid=16678). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-21 04:06:18.805; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 04:06:21.063; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30464ms
ok 25 start help flag prints help in 173ms
ok 26 stop help flag prints help in 169ms
ok 27 restart help flag prints help in 185ms
ok 28 status help flag prints help in 56ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 165ms
ok 30 create help flag prints help in 181ms
ok 31 createcore help flag prints help in 170ms
ok 32 createcollection help flag prints help in 172ms
ok 33 delete help flag prints help in 168ms
ok 34 version help flag prints help in 55ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 175ms
ok 36 auth help flag prints help in 171ms
ok 37 assert help flag prints help in 932ms
ok 38 post help flag prints help in 947ms
not ok 39 SQL Module in 10058ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:41171/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-21 04:07:05.771; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 04:07:05.823; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:41171/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 21300ms
not ok 41 icu collation in analysis-extras module in 13177ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-21 04:07:35.896; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-21 04:07:40.354; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1320ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 23192 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 23192 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9702ms
not ok 44 deploying and undeploying a collection level package in 196377ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 41171 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41171 (pid=20973). Happy searching!
#
#     
ok 45 Affinity placement plugin using sysprop in 15952ms
ok 46 Random placement plugin using ENV in 16999ms
ok 47 Check help command in 3771ms
ok 48 basic post with a type specified in 5909ms
ok 49 basic post WITHOUT a type specified in 12774ms
ok 50 crawling a directory in 4973ms
ok 51 crawling a web site in 5106ms
ok 52 commit and optimize and delete in 4175ms
ok 53 args mode in 6633ms
ok 54 stdin mode in 3512ms
ok 55 post solr log into solr via script in 10186ms
ok 56 post solr log into solr via cli in 9589ms
ok 57 allowPaths - backup in 17841ms
ok 58 start solr with ssl in 18400ms
ok 59 use different hostname when not checking peer-name in 30123ms
ok 60 start solr with ssl and auth in 16777ms
ok 61 start solr with client truststore and security manager in 20011ms
not ok 62 start solr with mTLS needed in 41048ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-SzwWjw/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41171 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41171 (pid=1352). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41172 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 41172 (pid=1485). Happy searching!
#
#     INFO  - 2023-10-21 04:15:07.444; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-21 04:15:07.449; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-21 04:15:07.801; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-SzwWjw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SzwWjw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-21 04:15:07.803; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-SzwWjw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SzwWjw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-21 04:15:07.804; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(ca,h=[localhost],a=[],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-SzwWjw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SzwWjw/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-21 04:15:07.844 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 A0 39 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 04:14:53.000 UTC",
#     "not  after"         : "2024-01-19 04:14:53.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#         0010: A0 9A FB 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 17 E4 BE 3A CD 9A 88   4F CD D9 A1 21 05 CE 03  ....:...O...!...
#         0010: F8 77 ED DF                                        .w..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 A4 F8 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 04:14:46.000 UTC",
#     "not  after"         : "2024-01-19 04:14:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 40 83 D7 59 BC A0 3B   07 8D EF 48 14 60 04 05  .@..Y..;...H.`..
#         0010: EE 5A 9F B3                                        .Z..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#         0010: A0 9A FB 57                                        ...W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-21 04:15:07.847 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 A0 F1 49",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 04:14:44.000 UTC",
#     "not  after"         : "2024-01-19 04:14:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 40 83 D7 59 BC A0 3B   07 8D EF 48 14 60 04 05  .@..Y..;...H.`..
#         0010: EE 5A 9F B3                                        .Z..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 A4 F8 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 04:14:46.000 UTC",
#     "not  after"         : "2024-01-19 04:14:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 40 83 D7 59 BC A0 3B   07 8D EF 48 14 60 04 05  .@..Y..;...H.`..
#         0010: EE 5A 9F B3                                        .Z..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#         0010: A0 9A FB 57                                        ...W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-21 04:15:07.860 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-21 04:15:08.019 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 04:15:08.019 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-21 04:15:08.022 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-21 04:15:08.023 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 04:15:08.030 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 04:15:08.044 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 04:15:08.044 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 04:15:08.045 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 04:15:08.050 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "72 BA 0A FA 08 CC 3A E4 3C EB 79 0A 73 73 90 11 64 2B 78 E9 AA 27 39 B8 96 E4 EF 8A 50 10 CD 7E",
#   "session id"          : "79 2E 59 62 FA D8 CC C3 F6 1A 9F 1B E4 B9 9F 0E 15 A8 0F 18 95 BE 41 D5 77 1D 0E 69 44 C4 C9 A2",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E2 67 EE FA 47 E7 90 B2   6C EB B6 F7 BD 34 65 89  .g..G...l....4e.
#             0010: 9A 12 63 7E 52 FA E7 AA   5E 8B 7F CF 22 15 2E 74  ..c.R...^..."..t
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.136 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "22 99 14 28 2C EA AF AC BC 48 98 55 86 70 31 33 B2 29 31 37 95 A9 9A A8 FE 8D A5 4D 6E 56 D4 BF",
#   "session id"          : "79 2E 59 62 FA D8 CC C3 F6 1A 9F 1B E4 B9 9F 0E 15 A8 0F 18 95 BE 41 D5 77 1D 0E 69 44 C4 C9 A2",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1A AA DD A5 E6 92 AE 40   B4 2B FC AF 37 C1 F4 F2  .......@.+..7...
#           0010: FB 37 0A 2E 4A 26 E4 3C   E6 E8 D3 E0 BC 78 2A 14  .7..J&.<.....x*.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.136 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.137 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.138 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.138 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.138 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.139 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.139 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.140 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:08.140 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:08.141 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.152 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.163 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.164 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.168 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.168 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.168 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.168 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.168 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.168 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.168 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:08.168 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:08.169 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.174 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.174 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.174 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.175 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.175 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.176 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:08.176 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.179 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "64 D6 F7 D0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-21 04:14:49.000 UTC",
#       "not  after"         : "2024-01-19 04:14:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#           0010: A0 9A FB 57                                        ...W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 2B 08 61 BF FE 0D EE   11 0E A4 FE 0F 60 1E 23  .+.a.........`.#
#           0010: 1F 60 6A 40                                        .`j@
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.180 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.247 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 A4 F8 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 04:14:46.000 UTC",
#     "not  after"         : "2024-01-19 04:14:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 40 83 D7 59 BC A0 3B   07 8D EF 48 14 60 04 05  .@..Y..;...H.`..
#         0010: EE 5A 9F B3                                        .Z..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#         0010: A0 9A FB 57                                        ...W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.251 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 50 48 A8 18 21 F9 D8 1F   3F 72 00 F2 02 8A A6 EE  PH..!...?r......
#     0010: 1B C9 47 BA 7E C1 2A D7   8E 1B 5D 90 F8 D3 A5 24  ..G...*...]....$
#     0020: C9 F5 24 C3 89 23 4A A1   72 B6 08 27 0E 7D 3D 8E  ..$..#J.r..'..=.
#     0030: 78 F7 D1 5E BA 83 B7 4F   5A 87 06 6C C0 14 C3 08  x..^...OZ..l....
#     0040: 6B 69 71 C3 3A 28 F3 8F   A7 D5 EF 54 79 72 17 6F  kiq.:(.....Tyr.o
#     0050: F0 B9 02 12 E1 EF 04 01   4A 99 06 D8 53 2D 3B EF  ........J...S-;.
#     0060: 32 5B C8 50 B5 EA 25 E6   9F AA D9 39 E5 02 F2 EF  2[.P..%....9....
#     0070: 1C 66 AA 23 D9 5C 12 7B   4C BA 7D 27 A7 A3 A9 02  .f.#.\..L..'....
#     0080: 2C D6 A6 A8 B6 DD F5 96   39 99 23 A5 61 37 05 E2  ,.......9.#.a7..
#     0090: 9B E8 FB C5 78 E0 99 9E   82 DC 25 05 27 FF F7 34  ....x.....%.'..4
#     00A0: 70 47 0E F3 43 A7 6F 73   51 DC 2E 2E 85 72 2F C9  pG..C.osQ....r/.
#     00B0: 1C 2F 92 7F 65 9A A7 0F   7A 46 9F 6F DB 39 F4 E0  ./..e...zF.o.9..
#     00C0: 2C E8 54 A8 6C 34 36 57   53 63 43 26 36 83 AC D6  ,.T.l46WScC&6...
#     00D0: 0E 79 66 B7 68 F3 7E B9   01 D8 34 6A 3E 78 BD 6D  .yf.h.....4j>x.m
#     00E0: 45 6D 6F 92 6E 08 27 77   E9 1B A6 9F F0 D5 1A CC  Emo.n.'w........
#     00F0: 11 FE A0 78 20 7C 19 9F   4D 4B 7E 64 8A 15 CC 55  ...x ...MK.d...U
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.252 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 08 F9 ED BD 78 76 66 FE   D2 97 A3 6C 18 B4 44 2F  ....xvf....l..D/
#     0010: 8B 80 B8 44 32 CF 40 61   B4 EC 32 E2 A4 0D DD 12  ...D2.@a..2.....
#     0020: D7 E5 E5 CC E3 B1 CF 2B   E3 12 F0 07 F4 C1 6C 5B  .......+......l[
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.254 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-21 04:15:08.255 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:08.255 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-21 04:15:08.255 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:08.255 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-21 04:15:08.255 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:08.255 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.256 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.258 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 A0 39 69",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-21 04:14:53.000 UTC",
#       "not  after"         : "2024-01-19 04:14:53.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#           0010: A0 9A FB 57                                        ...W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 17 E4 BE 3A CD 9A 88   4F CD D9 A1 21 05 CE 03  ....:...O...!...
#           0010: F8 77 ED DF                                        .w..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 A4 F8 05",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-21 04:14:46.000 UTC",
#       "not  after"         : "2024-01-19 04:14:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 40 83 D7 59 BC A0 3B   07 8D EF 48 14 60 04 05  .@..Y..;...H.`..
#           0010: EE 5A 9F B3                                        .Z..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#           0010: A0 9A FB 57                                        ...W
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.280 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 00 AE E2 F4 BE 59 6C 28   76 E7 44 E2 5B 57 83 AF  .....Yl(v.D.[W..
#     0010: 23 11 F0 19 B9 D5 6D 78   B5 4A 86 FA 6B 73 E7 AA  #.....mx.J..ks..
#     0020: F6 41 ED 06 68 1B 52 24   44 3B EB E7 90 94 D5 6D  .A..h.R$D;.....m
#     0030: EC AE E0 DA FE 17 D4 C3   66 74 05 A0 D0 A2 3C E3  ........ft....<.
#     0040: 94 0D 35 FA 1E 35 C2 A1   BF BC E4 70 3F E3 C9 4A  ..5..5.....p?..J
#     0050: A7 E0 3D C2 96 77 DC 1A   9A 3B 73 18 67 CD 61 45  ..=..w...;s.g.aE
#     0060: 29 F5 8D 2A 08 1E 58 6E   5C FA D3 DD 3C 0E B9 4D  )..*..Xn\...<..M
#     0070: AC 82 9B 82 CC 58 73 0F   17 FD A8 F1 A5 CF B9 E3  .....Xs.........
#     0080: 97 06 2D 20 69 52 81 96   FB A7 32 A0 19 26 40 14  ..- iR....2..&@.
#     0090: 6E F1 6D B0 BE C7 A7 DE   0D 0C 51 5E 5B 22 55 0E  n.m.......Q^["U.
#     00A0: 78 94 8B DE 40 4E 10 A6   BA 01 D5 5D E6 9F 48 09  x...@N.....]..H.
#     00B0: CC 0E 0B 2D AD 5A B7 B4   22 B8 97 34 25 39 3E D9  ...-.Z.."..4%9>.
#     00C0: 9A 9A 67 4D DE 64 A5 C8   B0 3F 1A 0A AF B1 0A DA  ..gM.d...?......
#     00D0: AD 56 02 34 7E 5E 3E 50   C8 B4 ED FA FA 73 BB 5D  .V.4.^>P.....s.]
#     00E0: 5D 2D B9 CB E1 7D 51 CC   44 D6 CB 67 B4 E8 5C BE  ]-....Q.D..g..\.
#     00F0: EF 75 09 75 74 60 F6 63   12 A4 29 44 16 B3 EA F8  .u.ut`.c..)D....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.282 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F3 CD AC B3 79 05 99 35   24 AC 5B 6F EE B2 A7 7E  ....y..5$.[o....
#     0010: 4E C0 4F 6D 9F D6 7F 78   83 A0 30 B6 E6 AD 0E 64  N.Om...x..0....d
#     0020: 0B B8 41 11 8A 5E 70 02   B2 D7 86 2D C7 00 F6 9F  ..A..^p....-....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.282 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:08.344 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "4F 3A 9B 2D 9D F4 74 49 DE 07 C0 BE 94 1B CA 61 B1 73 4F A8 58 6E 9A E2 00 F4 56 4A EF A7 E7 0D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-21 04:15:08.934 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-21 04:15:08.935 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-21 04:15:09.853; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-21 04:15:09.857; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-21 04:15:10.266; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-SzwWjw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SzwWjw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-21 04:15:10.268; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@165b8a71(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-SzwWjw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SzwWjw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-21 04:15:10.270; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6175619b(ca,h=[localhost],a=[],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-SzwWjw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SzwWjw/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-21 04:15:10.322 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 A0 39 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 04:14:53.000 UTC",
#     "not  after"         : "2024-01-19 04:14:53.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#         0010: A0 9A FB 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 17 E4 BE 3A CD 9A 88   4F CD D9 A1 21 05 CE 03  ....:...O...!...
#         0010: F8 77 ED DF                                        .w..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 A4 F8 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 04:14:46.000 UTC",
#     "not  after"         : "2024-01-19 04:14:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 40 83 D7 59 BC A0 3B   07 8D EF 48 14 60 04 05  .@..Y..;...H.`..
#         0010: EE 5A 9F B3                                        .Z..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#         0010: A0 9A FB 57                                        ...W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-21 04:15:10.325 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 A0 F1 49",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 04:14:44.000 UTC",
#     "not  after"         : "2024-01-19 04:14:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 40 83 D7 59 BC A0 3B   07 8D EF 48 14 60 04 05  .@..Y..;...H.`..
#         0010: EE 5A 9F B3                                        .Z..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 A4 F8 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 04:14:46.000 UTC",
#     "not  after"         : "2024-01-19 04:14:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 40 83 D7 59 BC A0 3B   07 8D EF 48 14 60 04 05  .@..Y..;...H.`..
#         0010: EE 5A 9F B3                                        .Z..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#         0010: A0 9A FB 57                                        ...W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-21 04:15:10.336 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-21 04:15:10.434 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-21 04:15:10.435 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-21 04:15:10.435 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-21 04:15:10.435 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-21 04:15:10.506 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 04:15:10.506 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-21 04:15:10.507 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-21 04:15:10.508 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 04:15:10.512 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 04:15:10.522 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 04:15:10.522 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 04:15:10.522 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-21 04:15:10.524 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0C 6F F0 3E 97 8B 6B C8 A9 03 45 2F C0 14 E4 41 DC F5 00 B9 A9 21 35 74 68 FA A6 E7 FA E2 AA 80",
#   "session id"          : "75 CF 3D 1F F5 5F 02 86 E6 83 4C 6D 03 6B 26 B6 39 B9 89 C7 85 E6 D1 E4 2B C8 16 E6 29 17 5B 3A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E2 16 08 99 CF A0 6D C8   BB D8 FC E8 76 9C C3 C5  ......m.....v...
#             0010: 7A 10 59 EC 3B 77 DB 42   E2 DA 73 EA 75 53 06 7A  z.Y.;w.B..s.uS.z
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.989 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "55 25 5F 21 91 63 DC DE A6 E4 39 35 FD BA 29 3D 46 64 E3 E2 1B 5D CA 57 F9 A1 D8 3B AC 04 85 7B",
#   "session id"          : "75 CF 3D 1F F5 5F 02 86 E6 83 4C 6D 03 6B 26 B6 39 B9 89 C7 85 E6 D1 E4 2B C8 16 E6 29 17 5B 3A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 60 61 E6 32 EC 11 84 43   90 D7 E8 B0 61 34 68 29  `a.2...C....a4h)
#           0010: 64 60 CE 88 6E 1C B4 A6   6B 9A 8C 74 16 DF 5B 71  d`..n...k..t..[q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.989 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.989 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.990 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.990 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.990 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.990 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.990 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.990 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.991 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.991 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.993 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.993 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.993 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.993 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.993 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.993 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.993 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.993 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.993 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.994 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:11.994 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:11.994 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.995 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:11.995 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.018 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.019 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.020 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.025 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.025 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.025 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.025 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.027 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.027 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.027 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:12.027 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:12.027 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.034 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.034 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.034 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.037 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.038 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.039 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:12.039 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.048 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "64 D6 F7 D0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-21 04:14:49.000 UTC",
#       "not  after"         : "2024-01-19 04:14:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#           0010: A0 9A FB 57                                        ...W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 2B 08 61 BF FE 0D EE   11 0E A4 FE 0F 60 1E 23  .+.a.........`.#
#           0010: 1F 60 6A 40                                        .`j@
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.049 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.454 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 A4 F8 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 04:14:46.000 UTC",
#     "not  after"         : "2024-01-19 04:14:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 40 83 D7 59 BC A0 3B   07 8D EF 48 14 60 04 05  .@..Y..;...H.`..
#         0010: EE 5A 9F B3                                        .Z..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#         0010: A0 9A FB 57                                        ...W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.457 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 06 27 BE 21 09 2E 38 C8   C1 D3 64 3C 84 63 9F 3B  .'.!..8...d<.c.;
#     0010: 01 EB 47 A3 6F 84 B7 3F   3C 57 EE EC 11 17 66 AF  ..G.o..?<W....f.
#     0020: 92 B5 97 81 8B 57 BC EF   5C 77 E3 64 1E EC B9 36  .....W..\w.d...6
#     0030: 05 6C 6B 91 87 9C EB D5   3D F0 09 1E 02 31 C9 24  .lk.....=....1.$
#     0040: A2 DE 96 D0 E9 F4 8E 94   CE 77 22 A2 2B 1B DF E8  .........w".+...
#     0050: D4 EF 19 54 5A C9 09 51   70 42 13 F6 AD F8 00 9F  ...TZ..QpB......
#     0060: A0 04 75 34 24 00 B4 78   C8 C5 AF 32 6C AA 7F 3A  ..u4$..x...2l..:
#     0070: 11 7A B1 74 3F 2E DE 4B   09 E8 32 D6 AA E2 56 86  .z.t?..K..2...V.
#     0080: A2 7F 3D 29 E5 7B A1 DA   15 18 C8 45 89 0C 93 B9  ..=).......E....
#     0090: 77 AD 5D E6 0C 82 77 87   76 35 AD 22 5D 7A 67 B8  w.]...w.v5."]zg.
#     00A0: 7D 05 98 03 14 8F 67 2D   06 84 0F F3 04 60 1A F3  ......g-.....`..
#     00B0: E3 15 86 92 33 81 7A 1B   07 C9 31 59 F0 87 28 FE  ....3.z...1Y..(.
#     00C0: 5B 9F F0 DB 8A 05 96 B2   52 2F FD 92 B0 95 7D 22  [.......R/....."
#     00D0: 66 F5 D6 CD C0 FF AC 12   9C 46 EB 41 82 D5 F5 65  f........F.A...e
#     00E0: 4F 6E B6 49 0A 1B 29 D9   A7 CA 86 70 9F B9 8B CC  On.I..)....p....
#     00F0: A3 82 AE F7 27 3F 96 4B   BF A0 8B 60 C4 F7 AE A6  ....'?.K...`....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.459 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CA C5 4A D7 38 BD D9 2A   FF 1D E9 24 D1 1A 95 4E  ..J.8..*...$...N
#     0010: 2D C6 BE D3 58 0C D1 EA   83 02 7F 42 F0 1E 93 7D  -...X......B....
#     0020: AD 07 A8 20 EF F1 5E 3A   6D E7 16 66 65 71 39 FA  ... ..^:m..feq9.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.461 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-21 04:15:12.461 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:12.462 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-21 04:15:12.462 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:12.462 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-21 04:15:12.462 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-21 04:15:12.462 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.462 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.464 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 A0 39 69",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-21 04:14:53.000 UTC",
#       "not  after"         : "2024-01-19 04:14:53.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#           0010: A0 9A FB 57                                        ...W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 17 E4 BE 3A CD 9A 88   4F CD D9 A1 21 05 CE 03  ....:...O...!...
#           0010: F8 77 ED DF                                        .w..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 A4 F8 05",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-21 04:14:46.000 UTC",
#       "not  after"         : "2024-01-19 04:14:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 40 83 D7 59 BC A0 3B   07 8D EF 48 14 60 04 05  .@..Y..;...H.`..
#           0010: EE 5A 9F B3                                        .Z..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#           0010: A0 9A FB 57                                        ...W
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.485 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 83 BC 2D 5E ED 5C 73 DF   26 D2 9D 00 25 B9 23 C7  ..-^.\s.&...%.#.
#     0010: 85 4B 0E 55 4F 29 61 2A   24 C6 20 B4 E2 52 90 BE  .K.UO)a*$. ..R..
#     0020: 1B D1 04 DE F2 95 4E 80   8E 63 26 8A B3 91 BD EC  ......N..c&.....
#     0030: 6B CE 36 ED CF 79 C5 59   4D DC 54 99 7C 51 F9 D2  k.6..y.YM.T..Q..
#     0040: 7B F4 A1 44 31 5B 64 8C   A3 58 3C A4 BE 21 88 EF  ...D1[d..X<..!..
#     0050: 48 47 16 A9 83 28 D1 1A   1A E6 31 05 2F 8B 51 BF  HG...(....1./.Q.
#     0060: 5A CF ED D7 A3 5F 45 9F   78 5B 7E 36 9A A9 B3 A0  Z...._E.x[.6....
#     0070: 22 0F 6A 61 D8 33 C4 09   EE BE 8E 41 34 05 E2 C3  ".ja.3.....A4...
#     0080: 74 93 3C 79 F9 1A 6E 59   B0 9E B2 91 78 4C BB EB  t.<y..nY....xL..
#     0090: EB 19 85 E2 66 C4 9E D5   3C D8 3A DC A9 41 D6 95  ....f...<.:..A..
#     00A0: 92 8E B8 ED AD E1 F5 84   66 3E FD F1 31 59 F7 4D  ........f>..1Y.M
#     00B0: 3C 51 41 87 9B ED 51 A2   00 46 41 47 BE BD 35 EF  <QA...Q..FAG..5.
#     00C0: A9 87 AA 31 1E C1 24 B8   6B D6 E9 AE 8E B4 B7 98  ...1..$.k.......
#     00D0: 8C C2 F7 4D AA 62 06 03   CD A3 34 20 44 EE 6C D5  ...M.b....4 D.l.
#     00E0: 86 FD 72 1F FF 76 7D 1E   23 52 90 41 7F 92 1A EE  ..r..v..#R.A....
#     00F0: D7 97 01 11 A7 56 C9 E7   01 93 1E 0E 4B 8F 47 77  .....V......K.Gw
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.486 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F5 3F 41 2C 58 9E A7 C2   05 B2 C7 BF 4B 9C E2 25  .?A,X.......K..%
#     0010: 45 70 60 AF A0 FF DC AF   B1 FD 50 B6 1E 99 00 C9  Ep`.......P.....
#     0020: 2A F4 83 AC A4 81 2C 8A   BA 0C 1A 01 B5 6E 36 49  *.....,......n6I
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.487 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-21 04:15:12.552 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "47 05 02 C8 79 9A 7D 80 C4 44 18 82 B8 7E 5A B1 FA E6 74 7C C6 08 D1 CF FC C3 10 3E F1 F4 28 FA",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-21 04:15:12.799 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-21 04:15:12.800 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (167 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-21 04:15:13.769; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-21 04:15:13.774; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-21 04:15:14.185 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 A0 39 69",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-21 04:14:53.000 UTC",
#       "not  after"         : "2024-01-19 04:14:53.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#  

[...truncated too long message...]

23-10-21 04:15:16.485 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 A0 F1 49",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 04:14:44.000 UTC",
#     "not  after"         : "2024-01-19 04:14:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 40 83 D7 59 BC A0 3B   07 8D EF 48 14 60 04 05  .@..Y..;...H.`..
#         0010: EE 5A 9F B3                                        .Z..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 A4 F8 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-21 04:14:46.000 UTC",
#     "not  after"         : "2024-01-19 04:14:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 40 83 D7 59 BC A0 3B   07 8D EF 48 14 60 04 05  .@..Y..;...H.`..
#         0010: EE 5A 9F B3                                        .Z..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 50 EB 4B B8 43 7B D8   49 BC 6A F6 0D 98 A1 49  .P.K.C..I.j....I
#         0010: A0 9A FB 57                                        ...W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-21 04:15:16.497 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 63 start solr with mTLS wanted in 50634ms
ok 64 SOLR-11740 check 'solr stop' connection in 14393ms
ok 65 stop command for single port in 17656ms
not ok 66 status detects locally running solr in 3670ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 23192 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 15695 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 23192 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 15695 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 246ms
ok 68 listing out files in 4042ms
ok 69 copying files around in 8677ms
ok 70 upconfig in 2927ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1224ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1229ms
not ok 73 Cleanup in 4800ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 23192 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 15695 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 23192 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 15695 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 36s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/aqwgkdh7lmdqk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 869 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/869/

All tests passed

Build Log:
[...truncated 1166 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 195967ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3268ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-20 19:04:17.630; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 19:04:17.678; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1162ms
not ok 8 accept d option with builtin config in 2243ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-20 19:04:21.057; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 19:04:21.115; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2345ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-20 19:04:23.453; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 19:04:23.505; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2295ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-20 19:04:25.766; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 19:04:25.815; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 3375ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-20 19:04:28.054; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 19:04:29.208; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 5445ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-20 19:04:31.346; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 19:04:34.698; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2129ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-20 19:04:36.800; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 19:04:36.851; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3011ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-20 19:04:44.981; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 19:04:45.031; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2218ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-20 19:04:47.217; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 19:04:47.269; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2136ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-20 19:04:49.388; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 19:04:49.437; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2235ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-20 19:04:51.647; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 19:04:51.697; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 25468ms
ok 19 Check export command in 21455ms
ok 20 export fails on non cloud mode in 9779ms
ok 21 using curl to extract a single pdf file in 20021ms
ok 22 using the bin/solr post tool to extract content from pdf in 19096ms
ok 23 using the bin/solr post tool to crawl web site in 19908ms
ok 24 healthcheck on cloud solr in 29792ms
ok 25 start help flag prints help in 175ms
ok 26 stop help flag prints help in 160ms
ok 27 restart help flag prints help in 160ms
ok 28 status help flag prints help in 50ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 152ms
ok 30 create help flag prints help in 158ms
ok 31 createcore help flag prints help in 149ms
ok 32 createcollection help flag prints help in 158ms
ok 33 delete help flag prints help in 149ms
ok 34 version help flag prints help in 48ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 153ms
ok 36 auth help flag prints help in 158ms
ok 37 assert help flag prints help in 857ms
ok 38 post help flag prints help in 959ms
ok 39 SQL Module in 16167ms
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 23057ms
ok 41 icu collation in analysis-extras module in 15402ms
not ok 42 package detects no running solr in 1194ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 23192 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 23192 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9552ms
ok 44 deploying and undeploying a collection level package in 13453ms
ok 45 Affinity placement plugin using sysprop in 18893ms
ok 46 Random placement plugin using ENV in 17157ms
ok 47 Check help command in 3826ms
ok 48 basic post with a type specified in 5213ms
ok 49 basic post WITHOUT a type specified in 12493ms
ok 50 crawling a directory in 4349ms
ok 51 crawling a web site in 4581ms
ok 52 commit and optimize and delete in 3731ms
ok 53 args mode in 6215ms
ok 54 stdin mode in 3225ms
ok 55 post solr log into solr via script in 9499ms
ok 56 post solr log into solr via cli in 10093ms
ok 57 allowPaths - backup in 18437ms
ok 58 start solr with ssl in 17837ms
ok 59 use different hostname when not checking peer-name in 30287ms
ok 60 start solr with ssl and auth in 16428ms
ok 61 start solr with client truststore and security manager in 19615ms
ok 62 start solr with mTLS needed in 63750ms
not ok 63 start solr with mTLS wanted in 37625ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 475)
#   `assert_output --partial "Created collection 'test'"' failed
# /tmp/bats-run-Ubkycx/test/63/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40005 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40005 (pid=10582). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40006 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 40006 (pid=10709). Happy searching!
#
#     INFO  - 2023-10-20 19:13:42.085; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 19:13:42.089; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 19:13:42.493; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-Ubkycx/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Ubkycx/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 19:13:42.761; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-Ubkycx/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Ubkycx/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 19:13:42.770; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5b970f7(ca,h=[localhost],a=[],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-Ubkycx/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Ubkycx/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 19:13:42.861 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 09 8F 66",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 19:13:28.000 UTC",
#     "not  after"         : "2024-01-18 19:13:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 B7 D0 F0 D5 3A 76 6A   28 13 6C 33 17 89 57 AA  R....:vj(.l3..W.
#         0010: CF B9 29 0F                                        ..).
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 AF 6B 45 54 70 79 BA   C9 A9 59 2A 6C 10 BC 9E  ..kETpy...Y*l...
#         0010: 6A F3 73 16                                        j.s.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 19:13:42.872 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C 7D 3D AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 19:13:22.000 UTC",
#     "not  after"         : "2024-01-18 19:13:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D FD 32 6B D3 72 7D A2   35 06 01 43 D1 8B C3 FF  ..2k.r..5..C....
#         0010: 12 F0 55 07                                        ..U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 B7 D0 F0 D5 3A 76 6A   28 13 6C 33 17 89 57 AA  R....:vj(.l3..W.
#         0010: CF B9 29 0F                                        ..).
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 2E 8F C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 19:13:20.000 UTC",
#     "not  after"         : "2024-01-18 19:13:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D FD 32 6B D3 72 7D A2   35 06 01 43 D1 8B C3 FF  ..2k.r..5..C....
#         0010: 12 F0 55 07                                        ..U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 19:13:42.899 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 19:13:43.089 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 19:13:43.090 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 19:13:43.092 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 19:13:43.092 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 19:13:43.098 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 19:13:43.112 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 19:13:43.112 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 19:13:43.112 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 19:13:43.115 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "79 CA BE 95 7F 03 41 89 07 04 62 CC 92 05 8F 4D E3 D8 E5 0C 2B CE 45 48 E5 70 67 CC B6 27 4B B7",
#   "session id"          : "3C D0 69 6E 33 0E 67 52 08 6E 7C 88 AD 68 1B 81 FA 72 17 79 38 E7 4F EB 78 92 D2 C1 A7 07 9B 8F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2F B5 7D 7A 8A 51 1B 05   43 2F AF B9 76 18 C0 79  /..z.Q..C/..v..y
#             0010: A4 ED E0 75 EE 0C A3 EF   99 F0 F1 6B 78 66 17 35  ...u.......kxf.5
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.275 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B3 A9 27 58 3A F3 5B 88 13 3D AD F0 09 FA AF 81 7D 22 18 22 0E 95 FE 00 C0 66 B0 2A 71 01 DF AF",
#   "session id"          : "3C D0 69 6E 33 0E 67 52 08 6E 7C 88 AD 68 1B 81 FA 72 17 79 38 E7 4F EB 78 92 D2 C1 A7 07 9B 8F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: AC BE E7 78 BF 39 7F AB   F3 6D CC 94 94 9E 54 2A  ...x.9...m....T*
#           0010: 93 15 89 CD 62 E4 51 E0   4F B5 21 18 A1 42 D5 5A  ....b.Q.O.!..B.Z
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.275 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.276 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.277 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.277 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.277 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.278 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.278 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.278 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.278 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.278 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.283 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.283 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.283 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.283 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.283 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.283 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.283 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.283 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.283 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.284 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:43.284 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:43.284 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.284 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.284 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.296 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.308 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.309 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.312 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.312 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.317 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.317 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.317 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:43.318 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:43.318 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.321 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.321 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.321 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.323 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.324 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.325 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:43.325 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.336 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0C 45 0C E9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 19:13:24.000 UTC",
#       "not  after"         : "2024-01-18 19:13:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 52 B7 D0 F0 D5 3A 76 6A   28 13 6C 33 17 89 57 AA  R....:vj(.l3..W.
#           0010: CF B9 29 0F                                        ..).
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 68 32 27 4B B6 36 FA CD   11 75 A1 F0 56 34 E3 F5  h2'K.6...u..V4..
#           0010: 4E D4 FF 4D                                        N..M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.336 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 19:13:43.810 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 19:13:43.810 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 19:13:43.810 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 19:13:43.810 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.841 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C 7D 3D AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 19:13:22.000 UTC",
#     "not  after"         : "2024-01-18 19:13:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D FD 32 6B D3 72 7D A2   35 06 01 43 D1 8B C3 FF  ..2k.r..5..C....
#         0010: 12 F0 55 07                                        ..U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 B7 D0 F0 D5 3A 76 6A   28 13 6C 33 17 89 57 AA  R....:vj(.l3..W.
#         0010: CF B9 29 0F                                        ..).
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.845 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4B 05 F3 67 8A A9 CB 1A   99 BB EF 29 2E 64 2D 64  K..g.......).d-d
#     0010: 7F 5C 93 92 6D 49 06 DF   DF F6 23 C4 89 FF 44 B7  .\..mI....#...D.
#     0020: 4D 64 1E 08 0B DE 6A 31   58 22 82 2E 41 A1 A9 70  Md....j1X"..A..p
#     0030: 94 D0 F5 FD 35 D9 15 22   6F 7A B5 57 1C CF 5D 81  ....5.."oz.W..].
#     0040: 7E 7F 5B 54 F1 01 80 9A   6E 61 FB E2 FF A9 9B A5  ..[T....na......
#     0050: 67 35 1D 9F 9F C4 B1 8F   E3 23 23 27 E9 1A 4A 4F  g5.......##'..JO
#     0060: 99 27 21 8A BD 13 4E B5   33 3F 24 5C 5D CC 6E D2  .'!...N.3?$\].n.
#     0070: 64 F1 95 55 91 1F 07 2E   12 D3 2D 3A 10 29 0E B4  d..U......-:.)..
#     0080: 18 2E 98 DA 84 37 4C 67   0F DF B2 99 84 6F AE CB  .....7Lg.....o..
#     0090: A4 20 FD 10 13 52 40 B8   85 6D 94 21 E6 2A D0 A6  . ...R@..m.!.*..
#     00A0: 6E 46 EB D3 AA 41 D6 62   06 9E 04 16 41 0D 0C F9  nF...A.b....A...
#     00B0: 64 BC 0C 32 FA 8E 2F A4   15 EC AF 8D A5 B8 5B CE  d..2../.......[.
#     00C0: B9 EB 37 E8 E0 B3 6E 20   FE 24 B3 66 6D 35 80 4F  ..7...n .$.fm5.O
#     00D0: D5 A1 91 4E 7B E2 0D E3   3C E8 71 01 D1 72 03 EF  ...N....<.q..r..
#     00E0: 7A 48 A7 51 66 0D 76 B5   C4 80 FC 93 CC 15 6A D8  zH.Qf.v.......j.
#     00F0: 58 0D 71 BE 28 EE C9 19   8F 75 68 75 99 57 4A 3A  X.q.(....uhu.WJ:
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.851 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2E D6 5E 71 95 8E 81 44   28 98 F4 28 55 00 3C 59  ..^q...D(..(U.<Y
#     0010: 4F CD 01 B0 5F 10 01 F0   52 33 20 9B EF DB 80 87  O..._...R3 .....
#     0020: C4 CC 20 C8 8F DA 52 B3   89 68 2E C7 04 94 3E 74  .. ...R..h....>t
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.853 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 19:13:43.854 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:43.854 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 19:13:43.854 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:43.855 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 19:13:43.855 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:43.855 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.855 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.857 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 09 8F 66",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 19:13:28.000 UTC",
#       "not  after"         : "2024-01-18 19:13:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 52 B7 D0 F0 D5 3A 76 6A   28 13 6C 33 17 89 57 AA  R....:vj(.l3..W.
#           0010: CF B9 29 0F                                        ..).
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 AF 6B 45 54 70 79 BA   C9 A9 59 2A 6C 10 BC 9E  ..kETpy...Y*l...
#           0010: 6A F3 73 16                                        j.s.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.927 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 78 2D E5 9E E2 6D 04 01   85 92 A4 D6 1A 4B A8 12  x-...m.......K..
#     0010: 1B 42 9F 62 3D 90 C9 59   65 52 58 88 86 C9 5B D3  .B.b=..YeRX...[.
#     0020: DE 89 43 9C 5C DC 23 1A   B4 0E 4C F6 89 2F F7 0F  ..C.\.#...L../..
#     0030: 59 B5 38 3E CA EE 23 D3   11 E2 BD 33 74 4C 3A F8  Y.8>..#....3tL:.
#     0040: DD E6 57 32 C8 5F 3D 54   A2 47 A6 F2 96 3C C8 F1  ..W2._=T.G...<..
#     0050: CE 44 CC 31 AC 8B A0 BD   F4 5E 37 8F 94 70 A2 A1  .D.1.....^7..p..
#     0060: F5 39 3C 81 54 54 B6 C8   E5 EB 76 4A DB 2F 47 9D  .9<.TT....vJ./G.
#     0070: B1 A9 01 95 26 9D CE 71   F4 A6 98 02 BE 55 64 4A  ....&..q.....UdJ
#     0080: D0 67 B5 A4 A5 B2 05 76   6D 37 0E 42 DC A3 64 8E  .g.....vm7.B..d.
#     0090: 7C B3 F5 E7 7E A9 DF 3E   3E 8A 75 03 F2 27 8B FB  .......>>.u..'..
#     00A0: 84 E8 65 8C DE 60 F3 21   A3 5D 69 FB 41 3C 17 5A  ..e..`.!.]i.A<.Z
#     00B0: A9 C8 AB 69 EB 43 7D 04   98 58 05 DC E8 C7 49 DB  ...i.C...X....I.
#     00C0: E8 C6 D5 93 5F 68 AC 52   57 E7 1C D5 A3 6E 96 57  ...._h.RW....n.W
#     00D0: 4B 22 6D FC D0 00 F7 4E   2F 9F 6B 20 3A 08 23 69  K"m....N/.k :.#i
#     00E0: 6F 6A 3A E4 04 1F 6A 1B   47 DF D9 F8 F9 B4 3B 46  oj:...j.G.....;F
#     00F0: 3A 16 0F DA 93 B1 DC F8   A2 3B E4 E2 FF 94 C8 54  :........;.....T
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.928 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 11 FB 85 87 18 80 42 22   37 6B 1C E7 93 0B E6 FC  ......B"7k......
#     0010: EC 80 6C 03 6A AC A3 4E   45 88 54 89 74 65 9A 7D  ..l.j..NE.T.te..
#     0020: A1 C7 1E 6B 4E 49 3E 2A   B1 18 FD 68 1E AB BA D5  ...kNI>*...h....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:43.931 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:44.030 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B9 55 20 93 89 69 F5 94 F0 F3 50 8B 82 97 7F 7F 02 87 CC F8 77 BB B4 6D 12 AC 71 45 2C CA 2C D8",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 19:13:44.248 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 19:13:44.249 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-20 19:13:46.120; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 19:13:46.124; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 19:13:46.489; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-Ubkycx/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Ubkycx/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 19:13:46.491; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-Ubkycx/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Ubkycx/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 19:13:46.491; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-Ubkycx/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Ubkycx/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 19:13:46.526 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 09 8F 66",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 19:13:28.000 UTC",
#     "not  after"         : "2024-01-18 19:13:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 B7 D0 F0 D5 3A 76 6A   28 13 6C 33 17 89 57 AA  R....:vj(.l3..W.
#         0010: CF B9 29 0F                                        ..).
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 AF 6B 45 54 70 79 BA   C9 A9 59 2A 6C 10 BC 9E  ..kETpy...Y*l...
#         0010: 6A F3 73 16                                        j.s.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 19:13:46.530 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C 7D 3D AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 19:13:22.000 UTC",
#     "not  after"         : "2024-01-18 19:13:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D FD 32 6B D3 72 7D A2   35 06 01 43 D1 8B C3 FF  ..2k.r..5..C....
#         0010: 12 F0 55 07                                        ..U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 B7 D0 F0 D5 3A 76 6A   28 13 6C 33 17 89 57 AA  R....:vj(.l3..W.
#         0010: CF B9 29 0F                                        ..).
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 2E 8F C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 19:13:20.000 UTC",
#     "not  after"         : "2024-01-18 19:13:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D FD 32 6B D3 72 7D A2   35 06 01 43 D1 8B C3 FF  ..2k.r..5..C....
#         0010: 12 F0 55 07                                        ..U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 19:13:46.540 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 19:13:46.681 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 19:13:46.681 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 19:13:46.682 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 19:13:46.682 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 19:13:46.686 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 19:13:46.695 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 19:13:46.695 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 19:13:46.695 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 19:13:46.697 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E9 ED A9 02 BB C5 33 AB 69 95 C7 27 3C 4E 94 43 15 7B 45 5B A4 51 65 AC 36 DE 24 20 FA 61 C9 B4",
#   "session id"          : "40 33 69 B8 49 83 2C D3 15 E5 A0 CC 51 20 55 07 45 9B F5 6D A8 4A 35 55 3B 2D B5 50 42 C7 6C BF",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 65 25 B6 E7 D0 91 1F 3B   2B CE B6 CD 11 8A 58 E7  e%.....;+.....X.
#             0010: D1 6C 83 C3 31 D1 4D B3   EE 29 A2 DE DF 4A 61 55  .l..1.M..)...JaU
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.787 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FD 1C 95 E5 6B 87 1F 51 0E 32 A2 66 1B 89 1E AD C4 98 60 98 89 E3 48 A5 E5 35 D0 AA 93 52 32 F2",
#   "session id"          : "40 33 69 B8 49 83 2C D3 15 E5 A0 CC 51 20 55 07 45 9B F5 6D A8 4A 35 55 3B 2D B5 50 42 C7 6C BF",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 13 02 D4 64 39 1F 94 DC   AA D9 84 42 1C 3E FA AE  ...d9......B.>..
#           0010: 03 93 BC 16 B2 C9 A8 2A   A1 E5 C6 A1 DF EF EC 2B  .......*.......+
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.788 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.788 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.789 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.789 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.789 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.789 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.795 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.795 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.795 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.795 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.795 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.795 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.795 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.795 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.796 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.796 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:46.796 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:46.796 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.796 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.796 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.802 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.803 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.804 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.812 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.812 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.812 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.812 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.812 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:46.813 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:46.813 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.814 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.814 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.814 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.814 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.815 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.816 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:46.816 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.818 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0C 45 0C E9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 19:13:24.000 UTC",
#       "not  after"         : "2024-01-18 19:13:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 52 B7 D0 F0 D5 3A 76 6A   28 13 6C 33 17 89 57 AA  R....:vj(.l3..W.
#           0010: CF B9 29 0F                                        ..).
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 68 32 27 4B B6 36 FA CD   11 75 A1 F0 56 34 E3 F5  h2'K.6...u..V4..
#           0010: 4E D4 FF 4D                                        N..M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.818 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.864 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C 7D 3D AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 19:13:22.000 UTC",
#     "not  after"         : "2024-01-18 19:13:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D FD 32 6B D3 72 7D A2   35 06 01 43 D1 8B C3 FF  ..2k.r..5..C....
#         0010: 12 F0 55 07                                        ..U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 B7 D0 F0 D5 3A 76 6A   28 13 6C 33 17 89 57 AA  R....:vj(.l3..W.
#         0010: CF B9 29 0F                                        ..).
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.867 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 18 41 BD 1E 7D EA 18 F6   12 01 81 7A 77 EC 84 A2  .A.........zw...
#     0010: D9 02 25 48 97 8D 49 1E   E6 F7 38 6E 23 5E B3 EE  ..%H..I...8n#^..
#     0020: FD 94 50 9F CD F7 A6 77   43 C1 1B 45 50 0F DA 18  ..P....wC..EP...
#     0030: 78 E6 3E 1D 3A 9E FA 96   D9 DE A9 78 63 CB 18 F4  x.>.:......xc...
#     0040: 66 E5 1A 4F 07 39 E1 0A   72 D6 FA A0 60 02 3C 5C  f..O.9..r...`.<\
#     0050: D5 B8 3A 3A 73 13 AF 12   E3 1F EC B9 49 CC 75 E6  ..::s.......I.u.
#     0060: 1C 71 F8 96 0B AF DE 99   61 C5 59 87 F5 E1 2C EC  .q......a.Y...,.
#     0070: BE A7 9E 34 F4 73 D1 B2   FA 67 6E 19 3D 37 4A C8  ...4.s...gn.=7J.
#     0080: 4E D5 E8 7F BF DF 61 2A   71 D0 5B A2 08 9C 0B E5  N.....a*q.[.....
#     0090: C5 0F 75 96 34 71 EF 24   33 31 E0 3C D8 5F 12 C8  ..u.4q.$31.<._..
#     00A0: 59 B4 D2 63 C8 1C C3 ED   78 73 3B 98 B6 69 43 BA  Y..c....xs;..iC.
#     00B0: 55 F1 1A D0 B2 14 AC 56   0B 86 80 33 0E 57 EF 3A  U......V...3.W.:
#     00C0: 14 8A 86 2F 7C 45 BC 64   88 50 5E 11 88 C8 B6 6D  .../.E.d.P^....m
#     00D0: C0 AF 6D 77 5E B0 3D 50   6F 57 FB 3F 9E A3 98 FA  ..mw^.=PoW.?....
#     00E0: 1E A0 DD B9 F0 BE 9B 0D   0E CB 2F DF A3 28 93 00  ........../..(..
#     00F0: 38 3B 7F 51 72 60 0C 82   EA 66 9C 33 15 2A 69 4B  8;.Qr`...f.3.*iK
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.869 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E5 08 F5 A3 86 E6 26 CB   53 FB 20 EB 88 5E 42 E7  ......&.S. ..^B.
#     0010: 10 54 9E 36 EF CF B6 96   14 7B 0B 8E 0A A4 A1 F5  .T.6............
#     0020: 24 84 0F 9D C3 7B 02 83   81 A6 EC CE 84 84 91 58  $..............X
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.870 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 19:13:46.871 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:46.871 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 19:13:46.871 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:46.871 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 19:13:46.871 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 19:13:46.871 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.872 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.873 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 09 8F 66",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 19:13:28.000 UTC",
#       "not  after"         : "2024-01-18 19:13:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 52 B7 D0 F0 D5 3A 76 6A   28 13 6C 33 17 89 57 AA  R....:vj(.l3..W.
#           0010: CF B9 29 0F                                        ..).
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 AF 6B 45 54 70 79 BA   C9 A9 59 2A 6C 10 BC 9E  ..kETpy...Y*l...
#           0010: 6A F3 73 16                                        j.s.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.892 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 34 BE C2 68 98 32 DF 40   28 7B A2 C8 48 E3 11 33  4..h.2.@(...H..3
#     0010: 79 A4 F6 3D 7C E3 D5 BF   18 F4 89 A7 32 C7 EE 87  y..=........2...
#     0020: 58 97 68 43 D8 8F 96 00   87 F9 D9 45 28 18 15 35  X.hC.......E(..5
#     0030: A9 79 1B 05 23 14 9F 5F   DB C5 15 C2 F5 75 79 BA  .y..#.._.....uy.
#     0040: 1A 98 35 10 59 34 16 82   83 E4 B4 BF 43 CC C1 77  ..5.Y4......C..w
#     0050: 1E 9C AC C3 E8 EA 7B 88   5C BC E9 AA 66 D6 31 EC  ........\...f.1.
#     0060: 57 67 FB E7 B9 2B E6 F6   E7 C7 3A 24 22 AA 98 3C  Wg...+....:$"..<
#     0070: DC 07 0F 06 70 FB 1A D7   E1 8E EE 59 64 07 A7 11  ....p......Yd...
#     0080: 7E 4E C0 40 AA 24 BC BD   21 08 2A 5F 07 BA F6 24  .N.@.$..!.*_...$
#     0090: D0 0F 8D A9 DE AA 91 04   4F A9 1F 7F C4 2F C7 8A  ........O..../..
#     00A0: 17 4D 79 CB 20 92 D7 9A   F5 BF 8C 9F CC 42 CB 5D  .My. ........B.]
#     00B0: 4B 11 CA 0D 9E 7A 75 63   DF 3D DE 1D 24 88 B4 BF  K....zuc.=..$...
#     00C0: CF 5F 6A A3 4B 1E 28 1B   3E 42 94 50 DD 9E 8F 98  ._j.K.(.>B.P....
#     00D0: 60 4F 01 8D 00 16 55 15   43 DB E8 4B 7B DF B2 5C  `O....U.C..K...\
#     00E0: 0B 70 02 3D 9F 07 35 0D   27 0C 46 08 22 9B E3 74  .p.=..5.'.F."..t
#     00F0: D2 83 41 CF E4 DB CA 18   B3 EC A7 5F 57 F8 9F 51  ..A........_W..Q
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.893 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C3 F1 5E D7 4D 69 51 55   12 C7 D2 F4 CC 2A 16 AA  ..^.MiQU.....*..
#     0010: 77 C2 80 7E 72 8A 3A D2   E9 57 7B 64 97 09 BD 75  w...r.:..W.d...u
#     0020: A2 17 9B B0 82 22 8F 63   60 E2 5F C6 63 85 63 FB  .....".c`._.c.c.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:46.893 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 19:13:47.168 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 19:13:47.169 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 19:13:47.169 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 19:13:47.169 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 19:13:47.177 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "6A 98 04 83 86 4F C8 17 A1 60 D2 5D A4 17 8A 85 19 21 F6 A6 BC 81 62 72 1A DD 92 38 83 87 93 34",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 19:13:47.388 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 19:13:47.389 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (131 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-20 19:13:48.247; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-20 19:13:48.251; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-20 19:13:48.836 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 09 8F 66",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 19:13:28.000 UTC",
#       "not  after"         : "2024-01-18 19:13:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 52 B7 D0 F0 D5 3A 76 6A   28 13 6C 33 17 89 57 AA  R....:vj(.l3..W.
#           0010: CF B9 29 0F                                        ..).
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 AF 6B 45 54 70 79 BA   C9 A9 59 2A 6C 10 BC 9E  ..kETpy...Y*l...
#           0010: 6A F3 73 16                                        j.s.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-20 19:13:48.839 U

[...truncated too long message...]

       DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 AF 6B 45 54 70 79 BA   C9 A9 59 2A 6C 10 BC 9E  ..kETpy...Y*l...
#         0010: 6A F3 73 16                                        j.s.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 19:13:50.884 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C 7D 3D AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 19:13:22.000 UTC",
#     "not  after"         : "2024-01-18 19:13:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D FD 32 6B D3 72 7D A2   35 06 01 43 D1 8B C3 FF  ..2k.r..5..C....
#         0010: 12 F0 55 07                                        ..U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 B7 D0 F0 D5 3A 76 6A   28 13 6C 33 17 89 57 AA  R....:vj(.l3..W.
#         0010: CF B9 29 0F                                        ..).
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 2E 8F C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 19:13:20.000 UTC",
#     "not  after"         : "2024-01-18 19:13:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D FD 32 6B D3 72 7D A2   35 06 01 43 D1 8B C3 FF  ..2k.r..5..C....
#         0010: 12 F0 55 07                                        ..U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 19:13:50.895 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14224ms
ok 65 stop command for single port in 17013ms
not ok 66 status detects locally running solr in 2353ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 23192 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 23192 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 3833ms
ok 69 copying files around in 12582ms
ok 70 upconfig in 2700ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1219ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1203ms
not ok 73 Cleanup in 3507ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 23192 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 23192 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 37s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/s76hlvh2quete

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 868 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/868/

1 tests failed.
FAILED:  org.apache.solr.search.TestThinCache.testSimple

Error Message:
java.lang.AssertionError: expected:<0> but was:<1>

Stack Trace:
java.lang.AssertionError: expected:<0> but was:<1>
	at __randomizedtesting.SeedInfo.seed([49CE1FDFD1BAC937:717D3B21F6491DE6]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.search.TestThinCache.testSimple(TestThinCache.java:139)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:54)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1356 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196297ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3002ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-20 13:39:50.628; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 13:39:50.673; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1067ms
not ok 8 accept d option with builtin config in 2158ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-20 13:39:53.884; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 13:39:53.935; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2144ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-20 13:39:56.057; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 13:39:56.106; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 3253ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-20 13:39:58.232; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 13:39:59.383; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 8728ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-20 13:40:01.481; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 13:40:08.140; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2087ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-20 13:40:10.205; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 13:40:10.250; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 3168ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-20 13:40:12.285; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 13:40:13.435; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 2951ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-20 13:40:21.518; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 13:40:21.563; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 3211ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-20 13:40:23.624; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 13:40:24.778; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2103ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-20 13:40:26.880; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 13:40:26.927; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 4273ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-20 13:40:28.978; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 13:40:31.228; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 26770ms
ok 19 Check export command in 20992ms
ok 20 export fails on non cloud mode in 8646ms
not ok 21 using curl to extract a single pdf file in 10587ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 42573 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42573 (pid=22216). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-20 13:41:36.200; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 13:41:38.451; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8896ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 42573 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42573 (pid=22715). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-20 13:41:46.227; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 13:41:47.380; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 11378ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 42573 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42573 (pid=23139). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-20 13:41:55.389; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 13:41:58.742; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 28999ms
ok 25 start help flag prints help in 148ms
ok 26 stop help flag prints help in 145ms
ok 27 restart help flag prints help in 147ms
ok 28 status help flag prints help in 47ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 144ms
ok 30 create help flag prints help in 142ms
ok 31 createcore help flag prints help in 147ms
ok 32 createcollection help flag prints help in 158ms
ok 33 delete help flag prints help in 147ms
ok 34 version help flag prints help in 48ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 150ms
ok 36 auth help flag prints help in 153ms
ok 37 assert help flag prints help in 848ms
ok 38 post help flag prints help in 852ms
ok 39 SQL Module in 15211ms
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 20984ms
ok 41 icu collation in analysis-extras module in 14008ms
not ok 42 package detects no running solr in 1174ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 23192 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 23192 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9343ms
ok 44 deploying and undeploying a collection level package in 13664ms
ok 45 Affinity placement plugin using sysprop in 15774ms
ok 46 Random placement plugin using ENV in 16056ms
ok 47 Check help command in 4224ms
ok 48 basic post with a type specified in 5531ms
ok 49 basic post WITHOUT a type specified in 11283ms
ok 50 crawling a directory in 4146ms
ok 51 crawling a web site in 4825ms
ok 52 commit and optimize and delete in 3682ms
ok 53 args mode in 5914ms
ok 54 stdin mode in 3192ms
ok 55 post solr log into solr via script in 9192ms
ok 56 post solr log into solr via cli in 9297ms
ok 57 allowPaths - backup in 16033ms
not ok 58 start solr with ssl in 12327ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 42573 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42573 (pid=1578). Happy searching!
#
#     INFO  - 2023-10-20 13:45:52.820; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 13:45:52.824; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 13:45:53.342; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-o1qcZT/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-o1qcZT/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-20 13:45:56.128; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-20 13:45:56.132; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-20 13:45:57.607; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 13:45:57.611; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12980ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 42573 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42573 (pid=2191). Happy searching!
#
#     INFO  - 2023-10-20 13:46:05.452; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 13:46:05.456; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 13:46:05.929; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-o1qcZT/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-o1qcZT/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-20 13:46:06.012; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-o1qcZT/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-o1qcZT/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-20 13:46:06.012; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-o1qcZT/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-o1qcZT/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-20 13:46:09.274; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-20 13:46:09.278; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-20 13:46:09.695; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-o1qcZT/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-o1qcZT/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-20 13:46:09.696; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-o1qcZT/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-o1qcZT/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-20 13:46:10.779; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 13:46:10.783; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-20 13:46:11.364; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-o1qcZT/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-o1qcZT/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-20 13:46:11.366; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-o1qcZT/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-o1qcZT/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 60 start solr with ssl and auth in 16629ms
ok 61 start solr with client truststore and security manager in 18975ms
ok 62 start solr with mTLS needed in 74585ms
ok 63 start solr with mTLS wanted in 60484ms
ok 64 SOLR-11740 check 'solr stop' connection in 13885ms
ok 65 stop command for single port in 17917ms
not ok 66 status detects locally running solr in 2380ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 23192 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 23192 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 223ms
ok 68 listing out files in 2634ms
ok 69 copying files around in 10524ms
ok 70 upconfig in 3739ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1201ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1211ms
not ok 73 Cleanup in 3483ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 23192 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 23192 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.search.TestThinCache.testSimple (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.search.TestThinCache.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.search.TestThinCache.testSimple" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=49CE1FDFD1BAC937 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 24s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/nkpibrsxzjos6

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 867 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/867/

All tests passed

Build Log:
[...truncated 1161 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196890ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 2990ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-20 09:24:50.940; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 09:24:50.985; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 2184ms
not ok 8 accept d option with builtin config in 2246ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-20 09:24:55.414; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 09:24:55.459; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 5534ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-20 09:24:57.630; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 09:25:00.987; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 11059ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-20 09:25:03.243; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 09:25:12.099; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 3211ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-20 09:25:14.171; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 09:25:15.321; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 3184ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-20 09:25:17.358; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 09:25:18.506; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 3181ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-20 09:25:20.593; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 09:25:21.748; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 14 can delete collections in 13008ms
ok 15 collection delete also deletes zk config in 8265ms
ok 16 deletes accompanying zk config with nondefault name in 7004ms
ok 17 deleteConfig option can opt to leave config in zk in 10332ms
ok 18 SOLR-16755 test works with noprompt in 22883ms
ok 19 Check export command in 21108ms
ok 20 export fails on non cloud mode in 10222ms
ok 21 using curl to extract a single pdf file in 18899ms
ok 22 using the bin/solr post tool to extract content from pdf in 20201ms
ok 23 using the bin/solr post tool to crawl web site in 18006ms
ok 24 healthcheck on cloud solr in 30342ms
ok 25 start help flag prints help in 151ms
ok 26 stop help flag prints help in 146ms
ok 27 restart help flag prints help in 151ms
ok 28 status help flag prints help in 47ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 143ms
ok 30 create help flag prints help in 143ms
ok 31 createcore help flag prints help in 148ms
ok 32 createcollection help flag prints help in 148ms
ok 33 delete help flag prints help in 146ms
ok 34 version help flag prints help in 49ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 157ms
ok 36 auth help flag prints help in 156ms
ok 37 assert help flag prints help in 881ms
ok 38 post help flag prints help in 934ms
ok 39 SQL Module in 16621ms
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 21889ms
not ok 41 icu collation in analysis-extras module in 8138ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-20 09:29:18.071; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 09:29:18.116; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1187ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 23192 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 23192 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9413ms
ok 44 deploying and undeploying a collection level package in 13144ms
ok 45 Affinity placement plugin using sysprop in 18338ms
ok 46 Random placement plugin using ENV in 21384ms
ok 47 Check help command in 3354ms
ok 48 basic post with a type specified in 5491ms
ok 49 basic post WITHOUT a type specified in 12313ms
ok 50 crawling a directory in 4573ms
ok 51 crawling a web site in 4893ms
ok 52 commit and optimize and delete in 4001ms
ok 53 args mode in 6127ms
ok 54 stdin mode in 3312ms
ok 55 post solr log into solr via script in 9650ms
ok 56 post solr log into solr via cli in 8061ms
ok 57 allowPaths - backup in 17056ms
ok 58 start solr with ssl in 18791ms
ok 59 use different hostname when not checking peer-name in 30463ms
not ok 60 start solr with ssl and auth in 10383ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 34215 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34215 (pid=11062). Happy searching!
#
#     INFO  - 2023-10-20 09:32:47.631; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 09:32:47.636; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-20 09:32:50.753; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 09:32:50.756; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13924ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-20 09:32:58.894; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-20 09:33:02.955; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-20 09:33:04.722; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 37812ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-PRB6Zm/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 34215 [|]   [/]   [-]   [\]
# Started Solr server on port 34215 (pid=12660). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 34216 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 34216 (pid=12769). Happy searching!
#
#     INFO  - 2023-10-20 09:33:29.949; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 09:33:29.956; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 09:33:30.923; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-PRB6Zm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PRB6Zm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 09:33:30.925; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-PRB6Zm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PRB6Zm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 09:33:30.925; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(ca,h=[localhost],a=[],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-PRB6Zm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PRB6Zm/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 09:33:30.982 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 E0 3F 82",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 09:33:16.000 UTC",
#     "not  after"         : "2024-01-18 09:33:16.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 04 65 8D 85 BF BD 6D   36 4B 3E ED 43 65 5D 0C  ..e....m6K>.Ce].
#         0010: 23 16 FC 65                                        #..e
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 98 67 0D 9C 46 3E 89   47 0D 0A 43 85 7C 0A 91  `.g..F>.G..C....
#         0010: E0 4C 55 A7                                        .LU.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 EA 39 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 09:33:09.000 UTC",
#     "not  after"         : "2024-01-18 09:33:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 B7 F7 26 F6 C2 F5 71   88 D5 39 87 39 57 34 3E  ...&...q..9.9W4>
#         0010: EE F1 2D 33                                        ..-3
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 04 65 8D 85 BF BD 6D   36 4B 3E ED 43 65 5D 0C  ..e....m6K>.Ce].
#         0010: 23 16 FC 65                                        #..e
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 09:33:30.989 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 EA 39 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 09:33:09.000 UTC",
#     "not  after"         : "2024-01-18 09:33:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 B7 F7 26 F6 C2 F5 71   88 D5 39 87 39 57 34 3E  ...&...q..9.9W4>
#         0010: EE F1 2D 33                                        ..-3
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 04 65 8D 85 BF BD 6D   36 4B 3E ED 43 65 5D 0C  ..e....m6K>.Ce].
#         0010: 23 16 FC 65                                        #..e
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 DF AC 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 09:33:08.000 UTC",
#     "not  after"         : "2024-01-18 09:33:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 B7 F7 26 F6 C2 F5 71   88 D5 39 87 39 57 34 3E  ...&...q..9.9W4>
#         0010: EE F1 2D 33                                        ..-3
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 09:33:31.005 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 09:33:31.592 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 09:33:31.592 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 09:33:31.593 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 09:33:31.593 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 09:33:31.684 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 09:33:31.684 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 09:33:31.685 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 09:33:31.686 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 09:33:31.689 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 09:33:31.699 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 09:33:31.699 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 09:33:31.699 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 09:33:31.700 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "34 45 D8 F8 EF 8D F0 F7 A7 45 31 60 EA 7B 65 6C 5B 6F 6B 83 8A 59 00 B7 C2 83 FF 60 FB 50 FC 22",
#   "session id"          : "C2 3B 6D B2 54 94 51 62 C5 11 FB 39 B8 AC 8B 08 1E 3A CC 09 42 EC B7 65 30 3F 09 E4 8C BC 94 EA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 85 39 4D 8E 42 BF 82 CA   CF 0B 09 4F 96 D4 26 91  .9M.B......O..&.
#             0010: 72 EB 7D 0B 09 C6 05 96   82 4E FD 92 D2 7B 3B 2D  r........N....;-
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.795 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "70 5C 9F 5D 82 E9 91 94 38 C1 4A F6 30 D8 06 49 16 0A 81 4A 0C 9E 44 0E 84 8D F8 87 96 C2 85 4F",
#   "session id"          : "C2 3B 6D B2 54 94 51 62 C5 11 FB 39 B8 AC 8B 08 1E 3A CC 09 42 EC B7 65 30 3F 09 E4 8C BC 94 EA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: AC E1 D9 16 53 C9 9D 13   99 61 C4 F2 2F 27 9D CE  ....S....a../'..
#           0010: F8 B4 82 E3 E1 B8 B9 24   D5 33 95 8C 76 BB C6 57  .......$.3..v..W
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.796 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.796 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.797 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.798 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.798 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.801 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.801 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 09:33:31.802 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 09:33:31.802 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.803 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.820 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.822 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.823 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.826 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.826 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.827 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.827 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.827 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 09:33:31.828 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 09:33:31.828 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.829 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.829 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.829 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.832 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.833 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.833 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 09:33:31.833 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.838 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 8B E5 47",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 09:33:12.000 UTC",
#       "not  after"         : "2024-01-18 09:33:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C5 04 65 8D 85 BF BD 6D   36 4B 3E ED 43 65 5D 0C  ..e....m6K>.Ce].
#           0010: 23 16 FC 65                                        #..e
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DF 09 2F 84 94 E8 EE 57   BD F2 E5 95 A5 E3 20 50  ../....W...... P
#           0010: DC 1B 8C 29                                        ...)
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.838 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.896 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 EA 39 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 09:33:09.000 UTC",
#     "not  after"         : "2024-01-18 09:33:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 B7 F7 26 F6 C2 F5 71   88 D5 39 87 39 57 34 3E  ...&...q..9.9W4>
#         0010: EE F1 2D 33                                        ..-3
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 04 65 8D 85 BF BD 6D   36 4B 3E ED 43 65 5D 0C  ..e....m6K>.Ce].
#         0010: 23 16 FC 65                                        #..e
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.901 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F 65 87 F3 CC 6D 92 23   99 DB F0 46 3E 0B 2B 2D  _e...m.#...F>.+-
#     0010: 89 E3 B7 6E 10 1D 59 CC   AE AE FB 73 CA 75 27 C4  ...n..Y....s.u'.
#     0020: 0B BA 60 0B 2A 12 A0 42   7B 48 6E 75 9D A8 82 4D  ..`.*..B.Hnu...M
#     0030: 44 8C A9 A0 63 06 38 86   91 35 0F 19 55 4C 65 14  D...c.8..5..ULe.
#     0040: CA DA 1B E6 66 22 3B A7   61 0E BB CC 2D 29 FB 5C  ....f";.a...-).\
#     0050: D2 7F 38 F7 FF F4 24 3E   F3 50 6A 2F BB E8 A8 64  ..8...$>.Pj/...d
#     0060: 64 2F 1A AC EB 64 AD 11   67 19 69 B6 F7 BA 37 61  d/...d..g.i...7a
#     0070: B7 84 3F 64 E9 33 B0 A7   FB 27 BB 9A 2D 2C 20 F6  ..?d.3...'..-, .
#     0080: 7D F8 D9 12 2D 68 53 50   F8 02 EF 76 DD 03 44 60  ....-hSP...v..D`
#     0090: A8 46 EC FB BA BB CE C7   94 82 BE BC E7 57 1F C9  .F...........W..
#     00A0: 9A 4C C0 A8 5C 57 06 9A   21 B1 74 B5 B0 F4 94 58  .L..\W..!.t....X
#     00B0: B5 DF 65 44 DE 82 BA 92   97 85 35 09 B8 44 B1 24  ..eD......5..D.$
#     00C0: A4 77 92 3B 9E BB 34 87   11 D9 1A BE DB 5F E0 42  .w.;..4......_.B
#     00D0: 57 72 C2 AF CB A2 6A D8   14 29 9D 0A DE 7C 98 1B  Wr....j..)......
#     00E0: 94 DD F3 57 D9 1F 0D 86   C4 06 64 7E 95 8F 80 0E  ...W......d.....
#     00F0: 2C 36 2A 9E C9 B2 1B E7   AC 6A 36 56 4F CD 1F 0A  ,6*......j6VO...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.902 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FF B3 45 CA DE 6B 67 2A   D9 A4 64 35 CE EC 51 65  ..E..kg*..d5..Qe
#     0010: 45 11 1C E3 69 A4 76 23   65 1D CD E0 20 B8 63 E3  E...i.v#e... .c.
#     0020: 4B 06 77 6E C0 F7 EC 34   F4 69 EC 18 5F 7F 7D 83  K.wn...4.i.._...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.904 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 09:33:31.904 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 09:33:31.904 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 09:33:31.905 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 09:33:31.905 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 09:33:31.905 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 09:33:31.905 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.905 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.907 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 E0 3F 82",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 09:33:16.000 UTC",
#       "not  after"         : "2024-01-18 09:33:16.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C5 04 65 8D 85 BF BD 6D   36 4B 3E ED 43 65 5D 0C  ..e....m6K>.Ce].
#           0010: 23 16 FC 65                                        #..e
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 98 67 0D 9C 46 3E 89   47 0D 0A 43 85 7C 0A 91  `.g..F>.G..C....
#           0010: E0 4C 55 A7                                        .LU.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 EA 39 D7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 09:33:09.000 UTC",
#       "not  after"         : "2024-01-18 09:33:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 B7 F7 26 F6 C2 F5 71   88 D5 39 87 39 57 34 3E  ...&...q..9.9W4>
#           0010: EE F1 2D 33                                        ..-3
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C5 04 65 8D 85 BF BD 6D   36 4B 3E ED 43 65 5D 0C  ..e....m6K>.Ce].
#           0010: 23 16 FC 65                                        #..e
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.932 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 15 67 3F 5E 94 45 CA AE   E1 BD ED 1E C7 B8 FF B1  .g?^.E..........
#     0010: 10 B6 6A 9D 6B 8A F0 20   5D 50 B2 3F 15 86 2E 41  ..j.k.. ]P.?...A
#     0020: 24 33 BD 84 9C 57 1C 68   1D 61 CD 54 74 EA AD 93  $3...W.h.a.Tt...
#     0030: A8 E1 39 65 0A AE A4 80   99 C2 75 D2 14 21 58 32  ..9e......u..!X2
#     0040: 25 5F B8 91 EB 35 8D AA   24 06 C8 DA 0E 9E 6F 7D  %_...5..$.....o.
#     0050: F3 B1 39 63 76 FF 43 04   21 3D AF 63 69 4F 45 81  ..9cv.C.!=.ciOE.
#     0060: 2B 4C C9 92 82 F8 F1 7C   43 70 F1 FC 9E 68 1D 5F  +L......Cp...h._
#     0070: 9E 74 62 02 76 9F 06 1C   78 70 9B 44 50 59 86 42  .tb.v...xp.DPY.B
#     0080: B5 F4 9E 8D 6B EA 6F 8E   4A 8B 88 55 5D 49 E3 7F  ....k.o.J..U]I..
#     0090: 09 8D 9B 1A F7 63 77 F3   3B 64 07 EB A8 57 57 AC  .....cw.;d...WW.
#     00A0: 52 03 79 0A 0F E8 9F 84   0C A5 2C 28 02 2C C9 B3  R.y.......,(.,..
#     00B0: 8B C3 FE 9A 6A 5E 2A 51   0D A1 F8 A2 39 BA BD 70  ....j^*Q....9..p
#     00C0: 85 29 F7 A8 93 04 0E 08   C6 A8 F0 78 7D BE EC 50  .).........x...P
#     00D0: FF 72 D4 1F 9C 03 B7 70   61 B9 60 FA 91 B3 29 EC  .r.....pa.`...).
#     00E0: 27 D5 AC AE 91 6F D9 3F   1D 45 FC A5 9C 1D 57 B4  '....o.?.E....W.
#     00F0: AD 24 54 6D 37 84 D9 20   C6 FC D0 05 6D 1E 55 FC  .$Tm7.. ....m.U.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.933 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 46 56 47 0C 56 AA E6 7B   26 49 6E 7C A5 1E 2A A6  FVG.V...&In...*.
#     0010: 5E 80 12 27 B3 7B 12 68   B2 F6 C5 3D 8E 3A DC 35  ^..'...h...=.:.5
#     0020: 73 5F 4D FE 86 19 31 9F   57 F0 AE C2 4F 57 9E 61  s_M...1.W...OW.a
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.934 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:31.997 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "ED 59 2D C8 BD 7A C7 EF 68 B3 24 C4 24 CD 00 32 8B 12 4D 3F D2 E5 2F FE 0B FF 71 E8 B8 78 90 5E",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 09:33:32.488 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 09:33:32.489 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-20 09:33:34.194; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 09:33:34.212; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 09:33:35.307; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-PRB6Zm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PRB6Zm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 09:33:35.309; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-PRB6Zm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PRB6Zm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 09:33:35.310; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(ca,h=[localhost],a=[],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-PRB6Zm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PRB6Zm/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 09:33:35.356 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 E0 3F 82",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 09:33:16.000 UTC",
#     "not  after"         : "2024-01-18 09:33:16.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 04 65 8D 85 BF BD 6D   36 4B 3E ED 43 65 5D 0C  ..e....m6K>.Ce].
#         0010: 23 16 FC 65                                        #..e
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 98 67 0D 9C 46 3E 89   47 0D 0A 43 85 7C 0A 91  `.g..F>.G..C....
#         0010: E0 4C 55 A7                                        .LU.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 EA 39 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 09:33:09.000 UTC",
#     "not  after"         : "2024-01-18 09:33:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 B7 F7 26 F6 C2 F5 71   88 D5 39 87 39 57 34 3E  ...&...q..9.9W4>
#         0010: EE F1 2D 33                                        ..-3
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 04 65 8D 85 BF BD 6D   36 4B 3E ED 43 65 5D 0C  ..e....m6K>.Ce].
#         0010: 23 16 FC 65                                        #..e
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 09:33:35.360 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 EA 39 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 09:33:09.000 UTC",
#     "not  after"         : "2024-01-18 09:33:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 B7 F7 26 F6 C2 F5 71   88 D5 39 87 39 57 34 3E  ...&...q..9.9W4>
#         0010: EE F1 2D 33                                        ..-3
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 04 65 8D 85 BF BD 6D   36 4B 3E ED 43 65 5D 0C  ..e....m6K>.Ce].
#         0010: 23 16 FC 65                                        #..e
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 DF AC 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 09:33:08.000 UTC",
#     "not  after"         : "2024-01-18 09:33:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 B7 F7 26 F6 C2 F5 71   88 D5 39 87 39 57 34 3E  ...&...q..9.9W4>
#         0010: EE F1 2D 33                                        ..-3
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 09:33:35.371 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 09:33:35.599 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 09:33:35.599 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 09:33:35.601 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 09:33:35.601 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 09:33:35.604 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 09:33:35.614 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 09:33:35.614 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 09:33:35.614 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 09:33:35.617 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "1D D9 26 AD 60 CF 1F CF BA D3 FE D0 25 52 3B C0 0B 04 93 FA 0A 6A A7 05 E7 77 B5 06 6A 49 BA E8",
#   "session id"          : "C4 F5 A3 FF 2F B9 5F 64 6E A0 42 E3 38 00 AE 11 37 88 4C 17 2E 72 7A D2 09 C3 A1 62 67 FF B9 AC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 70 B7 ED DD B3 12 B7 48   FA 70 2F B8 E7 D5 BB 84  p......H.p/.....
#             0010: 5B 16 EE 4E BB 87 E6 21   88 84 0A 84 B5 F2 D5 39  [..N...!.......9
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.130 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "59 37 97 AA 54 E9 20 C3 C1 95 58 AA 08 3C 6B 33 A2 AA 10 64 4A BC 7B 9B B2 7D 36 E6 95 B8 FD 2A",
#   "session id"          : "C4 F5 A3 FF 2F B9 5F 64 6E A0 42 E3 38 00 AE 11 37 88 4C 17 2E 72 7A D2 09 C3 A1 62 67 FF B9 AC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A2 31 48 A8 CB F4 D3 5E   43 D8 96 79 5B 2E 47 1E  .1H....^C..y[.G.
#           0010: 18 B0 28 21 C3 52 B4 A9   DB 3D A4 2B 76 6E C6 06  ..(!.R...=.+vn..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.131 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.131 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.132 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.132 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.132 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.133 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.133 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.133 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.134 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.135 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.137 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.142 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.142 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.142 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.142 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.143 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.143 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.143 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.143 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.143 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 09:33:36.143 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 09:33:36.144 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.156 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.157 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.163 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.166 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.167 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.167 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.167 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.167 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.167 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.167 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 09:33:36.167 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 09:33:36.167 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.169 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.169 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.171 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.172 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.172 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.173 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 09:33:36.173 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.175 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 8B E5 47",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 09:33:12.000 UTC",
#       "not  after"         : "2024-01-18 09:33:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C5 04 65 8D 85 BF BD 6D   36 4B 3E ED 43 65 5D 0C  ..e....m6K>.Ce].
#           0010: 23 16 FC 65                                        #..e
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DF 09 2F 84 94 E8 EE 57   BD F2 E5 95 A5 E3 20 50  ../....W...... P
#           0010: DC 1B 8C 29                                        ...)
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.175 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.225 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 EA 39 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 09:33:09.000 UTC",
#     "not  after"         : "2024-01-18 09:33:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 B7 F7 26 F6 C2 F5 71   88 D5 39 87 39 57 34 3E  ...&...q..9.9W4>
#         0010: EE F1 2D 33                                        ..-3
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 04 65 8D 85 BF BD 6D   36 4B 3E ED 43 65 5D 0C  ..e....m6K>.Ce].
#         0010: 23 16 FC 65                                        #..e
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 09:33:36.228 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 83 30 16 53 92 8B F0 32   4E B1 65 0B C0 4D 6B 90  .0.S...2N.e..Mk.
#     0010: 9D 05 04 C9 29 DF 45 FD   C1 41 57 8C 88 51 71 75  ....).E..AW..Qqu
#     0020: 78 D3 3C 6D 9F FF FE D8   28 7C 5B C3 54 76 B3 B6  x.<m....(.[.Tv..
#     0030: 9E 39 D4 97 73 8B 48 61   36 C1 0F 35 21 BD 94 9A  .9..s.Ha6..5!...
#     0040: C3 C2 2C 32 80 94 EC A8   65 66 D1 48 4C 56 6D 31  ..,2....ef.HLVm1
#     0050: EA F1 FD C9 63 7E D3 37   DB 22 8C 0B 3E 4E 5A 75  ....c..7."..>NZu
#     0060: 20 04 AB 26 CC 38 5E 21   C5 77 C0 B9 4D E8 20 D8   ..&.8^!.w..M. .
#     0070: AB FE F0 92 1A 93 7C 94   9A CA 21 EC 48 A7 34 98  ..........!.H.4.
#     0080: 93 B7 60 02 ED 10 36 76   A7 28 C2 B3 91 24 88 D5  ..`...6v.(...$..
#     0090: EF 64 DB 57 35 6C D3 D3   A5 CD 1C 84 81 2A EA CF  .d.W5l.......*..
#     00A0: 4A 7D D2 25 93 FA F3 84   A0 FE CE 6C 18 78 9A 8E  J..%.......l.x..
#     00B0: B9 99 0B C8 45 51 4C 86   34 3B 55 27 82 49 A4 CC  ....EQL.4;U'.I..
#     00C0: 4D 1C A3 ED 1A 2C 1E 88   A5 33 89 72 63 16 0D 5D  M....,...3.rc..]
#     00D0: 97 6A E5 36 BD 5E E1 02   98 CA C6 FF 1B 09 77 5B  .j.6.^........w[
#     00E0: E5 49 DB 73 1F 65 3E FF   40 FB 4F E3 30 69 58 9E  .I.s.e>.@.O.0i

[...truncated too long message...]

        DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D AF 6A 63 31 AE AA 80   5A 44 EB 04 7C F1 A8 65  ..jc1...ZD.....e
#         0010: AE CF 63 BD                                        ..c.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 09:34:15.686 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D B2 7C C8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 09:33:45.000 UTC",
#     "not  after"         : "2024-01-18 09:33:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 32 E0 17 1F A4 EA 37 8F   71 86 CF C8 74 4D 25 EC  2.....7.q...tM%.
#         0010: 7F A1 BC 9C                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 2A 48 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 09:33:47.000 UTC",
#     "not  after"         : "2024-01-18 09:33:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 32 E0 17 1F A4 EA 37 8F   71 86 CF C8 74 4D 25 EC  2.....7.q...tM%.
#         0010: 7F A1 BC 9C                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D A3 08 40 DA 4E 0D 9E   9D 03 B4 D0 F6 08 E2 53  -..@.N.........S
#         0010: 64 46 BA B8                                        dF..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 09:34:15.697 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 15132ms
ok 65 stop command for single port in 17247ms
not ok 66 status detects locally running solr in 2317ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 23192 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 23192 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2848ms
ok 69 copying files around in 7178ms
ok 70 upconfig in 3811ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1205ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1201ms
not ok 73 Cleanup in 3315ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 23192 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 23192 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 20s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/psffgvykbdfyw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 866 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/866/

No tests ran.

Build Log:
[...truncated 964 lines...]
FATAL: command execution failed
java.io.IOException: Backing channel 'lucene-solr-2' is disconnected.
	at hudson.remoting.RemoteInvocationHandler.channelOrFail(RemoteInvocationHandler.java:215)
	at hudson.remoting.RemoteInvocationHandler.invoke(RemoteInvocationHandler.java:285)
	at com.sun.proxy.$Proxy213.isAlive(Unknown Source)
	at hudson.Launcher$RemoteLauncher$ProcImpl.isAlive(Launcher.java:1215)
	at hudson.Launcher$RemoteLauncher$ProcImpl.join(Launcher.java:1207)
	at hudson.Launcher$ProcStarter.join(Launcher.java:524)
	at hudson.plugins.gradle.Gradle.perform(Gradle.java:321)
	at hudson.tasks.BuildStepMonitor$1.perform(BuildStepMonitor.java:20)
	at hudson.model.AbstractBuild$AbstractBuildExecution.perform(AbstractBuild.java:818)
	at hudson.model.Build$BuildExecution.build(Build.java:199)
	at hudson.model.Build$BuildExecution.doRun(Build.java:164)
	at hudson.model.AbstractBuild$AbstractBuildExecution.run(AbstractBuild.java:526)
	at hudson.model.Run.execute(Run.java:1900)
	at hudson.model.FreeStyleBuild.run(FreeStyleBuild.java:44)
	at hudson.model.ResourceController.execute(ResourceController.java:101)
	at hudson.model.Executor.run(Executor.java:442)
Caused by: java.io.IOException: Unexpected termination of the channel
	at hudson.remoting.SynchronousCommandTransport$ReaderThread.run(SynchronousCommandTransport.java:75)
Caused by: java.io.EOFException
	at java.base/java.io.ObjectInputStream$PeekInputStream.readFully(ObjectInputStream.java:2911)
	at java.base/java.io.ObjectInputStream$BlockDataInputStream.readShort(ObjectInputStream.java:3406)
	at java.base/java.io.ObjectInputStream.readStreamHeader(ObjectInputStream.java:932)
	at java.base/java.io.ObjectInputStream.<init>(ObjectInputStream.java:375)
	at hudson.remoting.ObjectInputStreamEx.<init>(ObjectInputStreamEx.java:49)
	at hudson.remoting.Command.readFrom(Command.java:142)
	at hudson.remoting.Command.readFrom(Command.java:128)
	at hudson.remoting.AbstractSynchronousByteArrayCommandTransport.read(AbstractSynchronousByteArrayCommandTransport.java:35)
	at hudson.remoting.SynchronousCommandTransport$ReaderThread.run(SynchronousCommandTransport.java:61)
Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
ERROR: Step ‘Archive the artifacts’ failed: no workspace for Solr/Solr-check-9.4 #866
ERROR: Step ‘Publish JUnit test result report’ failed: no workspace for Solr/Solr-check-9.4 #866
ERROR: lucene-solr-2 is offline; cannot locate jdk_11_latest
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any
ERROR: lucene-solr-2 is offline; cannot locate jdk_11_latest
ERROR: lucene-solr-2 is offline; cannot locate jdk_11_latest
ERROR: lucene-solr-2 is offline; cannot locate jdk_11_latest
ERROR: lucene-solr-2 is offline; cannot locate jdk_11_latest

[JENKINS] Solr » Solr-check-9.4 - Build # 865 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/865/

All tests passed

Build Log:
[...truncated 1315 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45615/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-20 02:15:50.765; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 02:15:50.769; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-20 02:15:51.568; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 02:15:51.608; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 17110ms
ok 61 start solr with client truststore and security manager in 19613ms
not ok 62 start solr with mTLS needed in 50630ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-697iTz/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 45615 [|]   [/]   [-]   [\]
# Started Solr server on port 45615 (pid=2053566). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 45616 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45616 (pid=2053673). Happy searching!
#
#     INFO  - 2023-10-20 02:16:54.233; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 02:16:54.243; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 02:16:55.147; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-697iTz/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-697iTz/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 02:16:55.150; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6175619b(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-697iTz/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-697iTz/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 02:16:55.150; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2f058b8a(ca,h=[localhost],a=[],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-697iTz/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-697iTz/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 02:16:55.230 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 07 30 57",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 02:16:40.000 UTC",
#     "not  after"         : "2024-01-18 02:16:40.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#         0010: E7 F7 AE 31                                        ...1
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 75 B3 63 0A C6 D4 80   2F 53 54 EB 8B FE A4 54  ku.c..../ST....T
#         0010: 7F E7 CB 51                                        ...Q
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 BB F5 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 02:16:33.000 UTC",
#     "not  after"         : "2024-01-18 02:16:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D9 34 3F CA 5B 37 D7   25 10 0C 37 D0 88 04 70  ..4?.[7.%..7...p
#         0010: E2 03 63 7C                                        ..c.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#         0010: E7 F7 AE 31                                        ...1
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 02:16:55.234 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 BB F5 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 02:16:33.000 UTC",
#     "not  after"         : "2024-01-18 02:16:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D9 34 3F CA 5B 37 D7   25 10 0C 37 D0 88 04 70  ..4?.[7.%..7...p
#         0010: E2 03 63 7C                                        ..c.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#         0010: E7 F7 AE 31                                        ...1
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 4C D4 A1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 02:16:31.000 UTC",
#     "not  after"         : "2024-01-18 02:16:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D9 34 3F CA 5B 37 D7   25 10 0C 37 D0 88 04 70  ..4?.[7.%..7...p
#         0010: E2 03 63 7C                                        ..c.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 02:16:55.251 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 02:16:55.859 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:16:55.859 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 02:16:55.861 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 02:16:55.861 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:16:55.877 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:16:55.894 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:16:55.894 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:16:55.895 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:16:55.897 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "41 15 64 7A 8E 3C D6 9F D7 8D 33 1C 70 0A E4 BE 54 7C 15 14 D7 D9 14 F2 E2 B2 00 7A 5D FF 99 73",
#   "session id"          : "3D C9 55 28 85 58 B6 2E B7 32 E5 83 DF FB 1D 12 52 83 A6 77 5A 85 20 25 F8 44 C6 6A 2A 03 BF 96",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6B 96 2A B9 B6 B5 53 5F   13 D9 23 24 60 44 06 BD  k.*...S_..#$`D..
#             0010: ED 0E DE B6 BA 51 6C 6A   78 AA B7 D6 47 D3 21 22  .....Qljx...G.!"
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.016 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "94 C8 CD 7C EE 36 6C 1B 8A AE 1D 14 1C AA 2E 4D A7 A6 0E 7B EA 3B 8E 58 25 67 C1 C8 A1 EF 36 C3",
#   "session id"          : "3D C9 55 28 85 58 B6 2E B7 32 E5 83 DF FB 1D 12 52 83 A6 77 5A 85 20 25 F8 44 C6 6A 2A 03 BF 96",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 53 61 17 F6 BE 18 EF A5   26 C9 7C C7 F8 D4 50 43  Sa......&.....PC
#           0010: A5 56 8A BD 6A 34 50 FB   71 E5 78 60 63 36 D0 08  .V..j4P.q.x`c6..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.016 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.017 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.021 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.021 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.021 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.021 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.022 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.022 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.022 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.022 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.024 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.024 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.024 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.025 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.025 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.025 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.025 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:56.027 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:56.027 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.027 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.027 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.054 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.056 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.057 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.060 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.060 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.060 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.060 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.060 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.060 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.060 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:56.060 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:56.061 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.062 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.062 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.062 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.062 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.063 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.068 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:56.069 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.088 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 C3 33 B1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 02:16:36.000 UTC",
#       "not  after"         : "2024-01-18 02:16:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#           0010: E7 F7 AE 31                                        ...1
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 C8 B6 4D 80 56 10 24   CB 69 41 01 34 B8 B1 C1  ...M.V.$.iA.4...
#           0010: 58 35 B7 B6                                        X5..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.088 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.190 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 BB F5 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 02:16:33.000 UTC",
#     "not  after"         : "2024-01-18 02:16:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D9 34 3F CA 5B 37 D7   25 10 0C 37 D0 88 04 70  ..4?.[7.%..7...p
#         0010: E2 03 63 7C                                        ..c.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#         0010: E7 F7 AE 31                                        ...1
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.193 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 38 14 78 F8 F3 A3 FA 3B   CE A3 98 1B 6C 80 3A 78  8.x....;....l.:x
#     0010: 3F BA 28 E0 B5 A8 31 76   B0 16 00 4F B5 F0 41 56  ?.(...1v...O..AV
#     0020: 5E 54 A2 1B 7C ED 51 EB   E4 7C A5 B1 10 65 3C 1A  ^T....Q......e<.
#     0030: 6F 00 0E 99 FD 8E 06 CB   F6 50 AF 11 B1 0E BA 0C  o........P......
#     0040: 34 54 8C E9 B3 C9 DD 87   99 7B 6C 1C 18 27 09 4D  4T........l..'.M
#     0050: 05 91 50 29 82 CE 21 EF   76 42 DB 6D 4C 2A 16 47  ..P)..!.vB.mL*.G
#     0060: 5C A1 F9 C1 EC 47 1C 76   4B 86 ED 4C 02 CC 31 A6  \....G.vK..L..1.
#     0070: 7D C5 65 7D 49 36 85 AC   26 42 FE 82 78 EA 4E CD  ..e.I6..&B..x.N.
#     0080: 4F DA 1F 91 ED DD 37 35   BF FD 3A 41 55 20 70 CC  O.....75..:AU p.
#     0090: 97 CB 8E C9 35 C2 2D B6   09 CE C5 99 85 3E 93 64  ....5.-......>.d
#     00A0: CB 69 C2 60 7C B0 8E 22   9C 9D F7 3A C8 E9 37 E8  .i.`..."...:..7.
#     00B0: D2 46 05 7F B5 16 D7 6E   CB A4 BF 9A B0 FA 4E E1  .F.....n......N.
#     00C0: A5 C5 DD F9 EE 10 24 13   3B 7A 96 46 F1 2D 16 C7  ......$.;z.F.-..
#     00D0: 8E 64 72 B7 3E B8 0A 80   78 FE 52 C0 9F 69 96 F0  .dr.>...x.R..i..
#     00E0: E5 AC 73 31 2F 3D 16 4F   8E 24 D6 6F 19 CC 73 39  ..s1/=.O.$.o..s9
#     00F0: DF 4A CE 73 87 DC 6B 18   E0 BC A7 FC 1F 71 08 86  .J.s..k......q..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.194 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 33 F9 CA AF 50 CD 62 78   60 A1 71 D5 3B D7 7B 40  3...P.bx`.q.;..@
#     0010: 89 52 F6 C0 51 1E 87 57   53 2D E0 DC 6A 11 CD A5  .R..Q..WS-..j...
#     0020: 7C 6F 62 29 F7 B3 05 F7   1D 85 8E 4E 0C 61 32 84  .ob).......N.a2.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.199 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 02:16:56.200 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:56.200 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 02:16:56.200 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:56.200 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 02:16:56.200 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:56.200 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.201 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.203 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3F 07 30 57",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 02:16:40.000 UTC",
#       "not  after"         : "2024-01-18 02:16:40.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#           0010: E7 F7 AE 31                                        ...1
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 75 B3 63 0A C6 D4 80   2F 53 54 EB 8B FE A4 54  ku.c..../ST....T
#           0010: 7F E7 CB 51                                        ...Q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 BB F5 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 02:16:33.000 UTC",
#       "not  after"         : "2024-01-18 02:16:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 D9 34 3F CA 5B 37 D7   25 10 0C 37 D0 88 04 70  ..4?.[7.%..7...p
#           0010: E2 03 63 7C                                        ..c.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#           0010: E7 F7 AE 31                                        ...1
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.242 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2E 8B 76 9C A9 63 40 52   E7 30 66 10 37 C4 ED 66  ..v..c@R.0f.7..f
#     0010: 91 90 0D 3A 6E 1A 9A B3   03 9C 8F 19 CB 56 40 99  ...:n........V@.
#     0020: CE 52 33 D0 17 E0 D7 DA   24 9F 28 80 84 36 66 CA  .R3.....$.(..6f.
#     0030: AB 59 16 A5 4C BD 85 CA   18 42 B5 FA D1 4F 9B 10  .Y..L....B...O..
#     0040: DF 2A 61 9A 2C 92 97 DB   04 BB 08 DD CC B5 78 0C  .*a.,.........x.
#     0050: 41 48 66 34 32 49 C5 AB   B9 34 00 5F 4E D3 A0 A5  AHf42I...4._N...
#     0060: A6 FB E7 F4 3C 4D 11 81   ED 9E DC 72 75 1B 26 29  ....<M.....ru.&)
#     0070: 35 50 5B B8 55 C3 6E C4   D0 64 4D 08 E2 C5 8C FB  5P[.U.n..dM.....
#     0080: BC 85 61 B3 3C 95 FE 56   92 14 71 1E F1 BC C7 66  ..a.<..V..q....f
#     0090: B3 04 B9 1F 31 D1 FF 0A   93 DB 39 FC B8 93 FF 88  ....1.....9.....
#     00A0: D4 3C 45 2F B1 1B FA 36   98 9C D6 4A 28 02 45 2A  .<E/...6...J(.E*
#     00B0: 8C 8D F8 C4 9F E6 5D B6   B8 29 82 79 E0 42 25 69  ......]..).y.B%i
#     00C0: C1 E4 63 E7 3E 01 EE 22   B6 0D 12 20 E8 5E BD 96  ..c.>.."... .^..
#     00D0: 66 F2 AC 28 A6 F3 28 EC   8A 03 D7 C9 3C A1 6D 61  f..(..(.....<.ma
#     00E0: 8C A6 8A 30 70 C5 B5 72   5A 9E 61 3E 24 96 2F DF  ...0p..rZ.a>$./.
#     00F0: FD FF CE 4B 04 A8 42 55   51 17 53 17 3D EE D1 4F  ...K..BUQ.S.=..O
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.245 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CD 5C 81 CB 72 7B D6 A8   6E 6C 3C 04 2C 58 3B CE  .\..r...nl<.,X;.
#     0010: 68 9E F7 FF 3E 56 20 F9   77 1E C1 DB 9F 8A 6F 01  h...>V .w.....o.
#     0020: 7B A3 68 DD A3 70 16 07   76 FF 44 50 2F A0 1B B2  ..h..p..v.DP/...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.246 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:56.695 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "80 9B 27 F6 26 C7 02 23 63 C3 48 50 1F 99 04 DB EC 21 44 53 7B A3 90 DD ED 20 7D 79 07 1B 99 F5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 02:16:56.744 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 02:16:56.745 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 02:16:56.745 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 02:16:56.745 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-20 02:16:57.340 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 02:16:57.341 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-20 02:16:58.304; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 02:16:58.309; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 02:16:58.692; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6256ac4f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-697iTz/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-697iTz/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 02:16:58.694; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-697iTz/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-697iTz/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 02:16:58.694; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(ca,h=[localhost],a=[],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-697iTz/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-697iTz/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 02:16:58.733 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 07 30 57",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 02:16:40.000 UTC",
#     "not  after"         : "2024-01-18 02:16:40.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#         0010: E7 F7 AE 31                                        ...1
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 75 B3 63 0A C6 D4 80   2F 53 54 EB 8B FE A4 54  ku.c..../ST....T
#         0010: 7F E7 CB 51                                        ...Q
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 BB F5 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 02:16:33.000 UTC",
#     "not  after"         : "2024-01-18 02:16:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D9 34 3F CA 5B 37 D7   25 10 0C 37 D0 88 04 70  ..4?.[7.%..7...p
#         0010: E2 03 63 7C                                        ..c.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#         0010: E7 F7 AE 31                                        ...1
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 02:16:58.737 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 BB F5 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 02:16:33.000 UTC",
#     "not  after"         : "2024-01-18 02:16:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D9 34 3F CA 5B 37 D7   25 10 0C 37 D0 88 04 70  ..4?.[7.%..7...p
#         0010: E2 03 63 7C                                        ..c.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#         0010: E7 F7 AE 31                                        ...1
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 4C D4 A1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 02:16:31.000 UTC",
#     "not  after"         : "2024-01-18 02:16:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D9 34 3F CA 5B 37 D7   25 10 0C 37 D0 88 04 70  ..4?.[7.%..7...p
#         0010: E2 03 63 7C                                        ..c.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 02:16:58.749 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 02:16:58.916 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:16:58.916 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 02:16:58.918 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 02:16:58.918 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:16:58.922 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:16:58.933 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:16:58.934 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:16:58.934 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:16:58.936 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "47 BB 0E 80 81 57 24 E2 01 74 F1 4E FE C8 87 C3 47 2D 15 73 D6 08 C2 02 55 AE 21 F5 5B 27 6B A7",
#   "session id"          : "87 AC 1D B0 94 BB 58 14 A9 CA 03 F8 7C 51 60 9C DC 5A 22 B9 4F B1 98 6A 05 73 81 C6 D4 CF B8 E5",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 79 78 4A D0 EE BD A2 35   D9 B5 DC 97 25 05 0F 5D  yxJ....5....%..]
#             0010: 1C 85 CA B9 34 D5 89 90   1A 09 8F D4 3F 22 4E 1D  ....4.......?"N.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.053 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D3 0D 78 D3 69 BA 0B A4 1C D7 A4 7A D2 22 AF 96 55 29 39 2F 6E 3E BD B1 FD 69 3E ED 1F 28 F2 5B",
#   "session id"          : "87 AC 1D B0 94 BB 58 14 A9 CA 03 F8 7C 51 60 9C DC 5A 22 B9 4F B1 98 6A 05 73 81 C6 D4 CF B8 E5",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: DC 9B 34 4E 9D 24 12 ED   47 44 19 04 E0 DC 71 D1  ..4N.$..GD....q.
#           0010: 64 CA 6B 2C 86 54 FF BF   6E 6E F1 AD 5E C3 F0 21  d.k,.T..nn..^..!
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.054 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.054 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.066 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.066 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.066 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.066 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.066 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.068 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.068 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.068 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.068 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.068 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.068 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.068 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:59.069 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:59.069 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.085 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.087 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.088 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.091 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.091 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.091 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.091 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.091 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.092 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:59.092 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:59.092 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.095 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.095 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.105 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.106 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.107 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.107 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:59.108 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.124 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 C3 33 B1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 02:16:36.000 UTC",
#       "not  after"         : "2024-01-18 02:16:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#           0010: E7 F7 AE 31                                        ...1
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 C8 B6 4D 80 56 10 24   CB 69 41 01 34 B8 B1 C1  ...M.V.$.iA.4...
#           0010: 58 35 B7 B6                                        X5..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.127 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.372 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 BB F5 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 02:16:33.000 UTC",
#     "not  after"         : "2024-01-18 02:16:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D9 34 3F CA 5B 37 D7   25 10 0C 37 D0 88 04 70  ..4?.[7.%..7...p
#         0010: E2 03 63 7C                                        ..c.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#         0010: E7 F7 AE 31                                        ...1
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.375 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 93 CB 03 54 C4 B5 4D 93   25 4D 13 04 CA FB 18 9B  ...T..M.%M......
#     0010: EF 88 B5 EA DB 55 93 6A   93 D8 D3 BE FE 65 CD 1D  .....U.j.....e..
#     0020: F6 C1 D8 79 30 3A E2 F1   4D D8 03 7B AD E1 2D 30  ...y0:..M.....-0
#     0030: 90 05 85 64 83 6B 4A 9B   8C 93 48 0A 4C 37 38 F6  ...d.kJ...H.L78.
#     0040: C3 61 02 62 20 A3 6A 19   BB C4 45 1C 76 FE D6 B6  .a.b .j...E.v...
#     0050: AE A2 63 17 F1 E0 9E B8   92 DB 9A EF F7 76 3A 4E  ..c..........v:N
#     0060: 7B 50 F8 8D AA E3 CB 40   55 B6 5A 23 DE 41 BF 8A  .P.....@U.Z#.A..
#     0070: CD CE 95 50 68 6E 93 05   15 C8 B2 5C 7C 46 99 96  ...Phn.....\.F..
#     0080: F0 35 1C 6F 8F 26 94 61   7C 9E E3 D8 13 CA 18 E4  .5.o.&.a........
#     0090: 82 6D 45 79 42 A8 89 A2   4D 52 32 B4 B1 B3 42 2D  .mEyB...MR2...B-
#     00A0: ED 4B 81 EF 3A B8 D8 92   CB 90 4A 3D 3D 4E B3 AA  .K..:.....J==N..
#     00B0: 8F F2 94 7E 5F 89 CD 46   84 E1 77 48 90 87 49 0B  ...._..F..wH..I.
#     00C0: 58 0C A6 66 A3 69 DB B7   A0 F0 01 CF 7E 54 AD A1  X..f.i.......T..
#     00D0: D1 B9 12 98 75 D7 27 1B   9A 4B 9A 11 F4 A5 94 0B  ....u.'..K......
#     00E0: 70 D8 FE E1 BE 31 58 C8   9B 1B B5 4E 37 35 A4 82  p....1X....N75..
#     00F0: 68 1C BB F1 7A 6F E7 89   24 65 64 AA A8 94 EE EB  h...zo..$ed.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.376 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 94 EC 62 F3 46 14 C6 41   D6 7F 53 C9 84 0B 59 F1  ..b.F..A..S...Y.
#     0010: 6C 3F 88 04 F9 34 56 15   95 3B D2 9F C8 E5 D4 25  l?...4V..;.....%
#     0020: C5 A6 81 24 DE 3B 2C E0   6F 80 1C 54 CE ED 7B DE  ...$.;,.o..T....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.377 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 02:16:59.378 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:59.378 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 02:16:59.378 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:59.378 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 02:16:59.379 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:16:59.379 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.379 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.381 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3F 07 30 57",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 02:16:40.000 UTC",
#       "not  after"         : "2024-01-18 02:16:40.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#           0010: E7 F7 AE 31                                        ...1
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 75 B3 63 0A C6 D4 80   2F 53 54 EB 8B FE A4 54  ku.c..../ST....T
#           0010: 7F E7 CB 51                                        ...Q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 BB F5 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 02:16:33.000 UTC",
#       "not  after"         : "2024-01-18 02:16:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 D9 34 3F CA 5B 37 D7   25 10 0C 37 D0 88 04 70  ..4?.[7.%..7...p
#           0010: E2 03 63 7C                                        ..c.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#           0010: E7 F7 AE 31                                        ...1
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.404 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 23 CA 35 88 F1 94 A9 37   83 6F 5B 0D 20 84 81 45  #.5....7.o[. ..E
#     0010: 1E 89 D3 06 3C 54 6B 15   42 B4 FA 00 6C 4D 30 A1  ....<Tk.B...lM0.
#     0020: E8 09 A6 F9 F8 67 18 D2   5E 2D 3C 77 11 06 24 9A  .....g..^-<w..$.
#     0030: 3B D0 03 9E 01 2A C1 74   E7 92 AD F0 84 4C 7F 8E  ;....*.t.....L..
#     0040: B0 E2 8E BF 22 99 59 50   38 A8 DA 92 F1 16 29 BF  ....".YP8.....).
#     0050: 66 97 A0 9B 96 3D 5A 9E   CD 0C 63 BE A8 30 8F 89  f....=Z...c..0..
#     0060: CD FF 86 0F F1 3A 6E 9E   4A 2E 54 06 FD 17 E5 82  .....:n.J.T.....
#     0070: B5 15 03 22 7E 0B 41 7E   87 6D C3 AD 88 82 1C AC  ..."..A..m......
#     0080: 50 E8 9F 8D FC 03 47 31   8C 05 A6 D8 B4 72 4E 4D  P.....G1.....rNM
#     0090: 0C A1 E9 47 AB 12 CC 6E   3C 95 29 73 54 3B 83 54  ...G...n<.)sT;.T
#     00A0: 5A 57 64 DC 6E 5A 44 47   CA 18 B7 A8 A2 A3 D3 53  ZWd.nZDG.......S
#     00B0: 0A D0 22 3A 1C D4 DE 67   15 32 BA 0E 36 3F E8 C0  ..":...g.2..6?..
#     00C0: 3B 99 C2 FB BE 01 6C F6   CA B6 07 03 45 03 71 05  ;.....l.....E.q.
#     00D0: 2D E6 D6 8E D3 CD 3B 72   91 A2 7A E9 ED D7 71 57  -.....;r..z...qW
#     00E0: EA 39 CD 64 4A 08 FB 46   86 66 30 E6 1E BE 4B 64  .9.dJ..F.f0...Kd
#     00F0: A1 61 6E E1 B1 AF FC 51   13 7E 42 EF 06 CB 17 12  .an....Q..B.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.405 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 35 82 BA 31 CE BE 22 B4   D5 0C 61 F8 E8 9B F7 91  5..1.."...a.....
#     0010: 76 88 99 E3 82 72 76 B2   6A 43 DE 02 3C FB 9E D4  v....rv.jC..<...
#     0020: 31 E6 42 41 C0 E6 A7 18   14 1E DC 90 DF 8C A3 72  1.BA...........r
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.406 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 02:16:59.447 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 02:16:59.447 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 02:16:59.447 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 02:16:59.447 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:16:59.483 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F5 E5 78 6D 3B 30 25 03 6E 94 A4 0F 17 FA 6A 7F 30 8F 98 B2 EB 0E A1 7A 27 E4 7E 99 19 EB 90 C2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 02:16:59.949 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 02:16:59.950 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-20 02:17:11.706; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-20 02:17:12.078 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 BB F5 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 02:16:33.000 UTC",
#       "not  after"         : "2024-01-18 02:16:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 D9 34 3F CA 5B 37 D7   25 10 0C 37 D0 88 04 70  ..4?.[7.%..7...p
#           0010: E2 03 63 7C                                        ..c.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 40 B4 7B CB 88 11 01 57   22 D3 18 DE EB 36 1D 1C  @......W"....6..
#           0010: E7 F7 AE 31                                        ...1
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 4C D4 A1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 02:16:31.000 UTC",
#       "not  after"         : "2024-01-18 02:16:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 D9 34 3F CA 5B 37 D7   25 10 0C 37 D0 88 04 70  ..4?.[7.%..7...p
#           0010: E2 03 63 7C                                        ..c.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-20 02:17:12.091 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 02:17:12.242 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 02:17:12.242 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 02:17:12.243 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 02:17:12.243 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 02:17:12.267 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:17:12.268 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 02:17:12.269 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 02:17:12.269 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:17:12.274 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:17:12.285 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:17:12.285 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:17:12.285 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 02:17:12.287 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "38 20 E3 7D 45 48 2E 60 75 9D 98 C8 2C 2D D6 B5 D2 35 F5 29 1D FC 8E DE 87 2E 01 AF 46 4B 4F E7",
#     "session id"          : "53 83 A2 67 BD A5 60 F8 1C 3D A1 64 C8 43 C5 7A 48 1A 74 62 D0 73 48 A0 C1 8E A8 59 E0 D3 FE A0",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 02 93 DD A0 4E 93 75 35   F7 56 C0 53 E5 C3 FF E7  ....N.u5.V.S....
#               0010: 2C 4D CF C6 0B A4 56 6D   2B 99 C4 F5 4D 7B 81 77  ,M....Vm+...M..w
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.307 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "5F F1 CC E6 A6 8F BB BA 68 98 96 9B 34 0F BF E2 FD 3B 2F D7 C2 25 A4 FA 85 42 96 2D AA 43 AF 98",
#     "session id"          : "53 83 A2 67 BD A5 60 F8 1C 3D A1 64 C8 43 C5 7A 48 1A 74 62 D0 73 48 A0 C1 8E A8 59 E0 D3 FE A0",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7A 1F FC BE 44 43 FB 86   26 E3 AD 14 8C 1D 15 E9  z...DC..&.......
#             0010: 61 25 40 E6 D2 85 49 98   D4 B8 B5 B9 90 61 33 6D  a%@...I......a3m
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.308 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.308 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.308 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.308 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.309 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.311 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.311 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.311 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.311 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.311 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.312 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.312 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.312 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.312 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.312 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:17:12.312 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:17:12.312 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.312 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.312 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.319 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.320 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.322 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.326 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.326 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.326 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.326 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.326 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.326 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.329 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:17:12.329 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:17:12.329 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.330 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.330 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.330 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.331 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.331 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 02:17:12.332 U

[...truncated too long message...]

ath to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 02:18:25.054 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45616/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14522ms
ok 65 stop command for single port in 17785ms
not ok 66 status detects locally running solr in 1489ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 246ms
ok 68 listing out files in 2976ms
ok 69 copying files around in 6596ms
ok 70 upconfig in 2575ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1249ms
not ok 73 Cleanup in 2520ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 48s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/45tgjn5ghsxhs

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 864 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/864/

All tests passed

Build Log:
[...truncated 1201 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-19 23:43:06.585; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 23:43:09.935; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1223ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 28715 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9609ms
not ok 44 deploying and undeploying a collection level package in 196004ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 34225 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34225 (pid=11366). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 10720ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-19 23:46:46.703; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 23:46:46.756; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-19 23:46:47.674; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 23:46:47.722; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 14086ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-19 23:46:57.433; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 23:46:59.683; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-19 23:47:00.619; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 23:47:01.771; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3303ms
not ok 48 basic post with a type specified in 1237ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1135ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1549ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1859ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1670ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1582ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1350ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 5041ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-19 23:47:31.085; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 23:47:31.150; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 3427ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-19 23:47:34.242; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 23:47:34.600; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 14558ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:34225/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-qxxKrb%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-19 23:47:49.241; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 23:47:49.305; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:34225/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-qxxKrb%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 13387ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 34225 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34225 (pid=18167). Happy searching!
#
#     INFO  - 2023-10-19 23:47:56.417; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 23:47:56.424; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 23:47:56.961; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-qxxKrb/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-qxxKrb/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 23:48:00.216; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 23:48:00.568; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-19 23:48:01.967; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 23:48:01.971; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 19404ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 34225 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34225 (pid=18866). Happy searching!
#
#     INFO  - 2023-10-19 23:48:11.208; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 23:48:11.213; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 23:48:11.849; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-qxxKrb/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-qxxKrb/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 23:48:11.906; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-qxxKrb/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-qxxKrb/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 23:48:11.906; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-qxxKrb/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-qxxKrb/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 23:48:19.937; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 23:48:19.941; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-19 23:48:20.318; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-qxxKrb/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-qxxKrb/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-19 23:48:20.320; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-qxxKrb/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-qxxKrb/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 23:48:21.363; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 23:48:21.368; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 23:48:21.751; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@1b11ef33[provider=null,keyStore=file:///tmp/bats-run-qxxKrb/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-qxxKrb/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 23:48:21.753; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@1b11ef33[provider=null,keyStore=file:///tmp/bats-run-qxxKrb/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-qxxKrb/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 12159ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 34225 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34225 (pid=21193). Happy searching!
#
#     INFO  - 2023-10-19 23:48:30.840; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 23:48:30.868; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-19 23:48:33.760; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 23:48:33.764; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 15334ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-19 23:48:42.127; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 23:48:47.100; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-19 23:48:49.197; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 42653ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-qxxKrb/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 34225 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34225 (pid=23670). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 34226 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34226 (pid=23829). Happy searching!
#
#     INFO  - 2023-10-19 23:49:17.788; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 23:49:18.166; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 23:49:19.111; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-qxxKrb/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qxxKrb/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 23:49:19.113; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-qxxKrb/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qxxKrb/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 23:49:19.113; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(ca,h=[localhost],a=[],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-qxxKrb/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qxxKrb/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 23:49:19.234 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 C8 01 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 23:49:03.000 UTC",
#     "not  after"         : "2024-01-17 23:49:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 7B 45 B0 2B EA F1 15   DA 56 0A DD CB CC 1F 25  ..E.+....V.....%
#         0010: C3 3C 4F A2                                        .<O.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C 0C 3B 00 35 A7 16 B4   CD C8 E3 3D FF 2B B5 C9  ..;.5......=.+..
#         0010: 0B A8 67 3E                                        ..g>
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E B1 7E 6E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 23:48:55.000 UTC",
#     "not  after"         : "2024-01-17 23:48:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FA 9E 96 2A 26 43 3C 62   39 21 65 6B 71 BA CE A7  ...*&C<b9!ekq...
#         0010: 44 4B EF BB                                        DK..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 7B 45 B0 2B EA F1 15   DA 56 0A DD CB CC 1F 25  ..E.+....V.....%
#         0010: C3 3C 4F A2                                        .<O.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 23:49:19.238 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 33 2F 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 23:48:52.000 UTC",
#     "not  after"         : "2024-01-17 23:48:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FA 9E 96 2A 26 43 3C 62   39 21 65 6B 71 BA CE A7  ...*&C<b9!ekq...
#         0010: 44 4B EF BB                                        DK..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E B1 7E 6E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 23:48:55.000 UTC",
#     "not  after"         : "2024-01-17 23:48:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FA 9E 96 2A 26 43 3C 62   39 21 65 6B 71 BA CE A7  ...*&C<b9!ekq...
#         0010: 44 4B EF BB                                        DK..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 7B 45 B0 2B EA F1 15   DA 56 0A DD CB CC 1F 25  ..E.+....V.....%
#         0010: C3 3C 4F A2                                        .<O.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 23:49:19.254 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 23:49:19.551 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 23:49:19.552 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 23:49:19.553 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 23:49:19.557 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 23:49:19.569 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 23:49:19.985 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 23:49:19.985 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 23:49:19.985 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 23:49:19.990 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "17 2E 39 EF 97 E1 3C D3 9D A7 33 1F 12 4E AC 2C A6 7E F3 67 25 74 9E 63 64 6D 7F 60 0B 32 01 4E",
#   "session id"          : "DC BF B8 31 EC 15 9E BB 2F D1 F8 42 5C 6E DB A8 04 9D 4C 51 CF 1F A0 85 84 F0 D8 94 5D 8B 3E E8",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 43 F1 4E 22 FF 24 6F EE   52 43 C0 53 0D 15 56 FD  C.N".$o.RC.S..V.
#             0010: EB B6 00 54 D5 24 2B 31   C5 40 20 5B B9 AC A6 43  ...T.$+1.@ [...C
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.125 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "34 03 84 E5 AB 28 60 69 05 5F 42 6C B6 2C 6A 49 81 D7 27 2A 4E BD D9 9F 0C DE AC 3B 86 FA 1B EE",
#   "session id"          : "DC BF B8 31 EC 15 9E BB 2F D1 F8 42 5C 6E DB A8 04 9D 4C 51 CF 1F A0 85 84 F0 D8 94 5D 8B 3E E8",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D8 82 40 82 EC 52 BE 9B   E1 A8 84 BC A0 3C B7 AE  ..@..R.......<..
#           0010: C6 08 4A 6A D1 79 84 2C   F1 B8 84 E5 96 FE 2B 6A  ..Jj.y.,......+j
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.125 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.125 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.128 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.129 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.129 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.129 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.130 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.130 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.130 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.130 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.130 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.130 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.130 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 23:49:20.130 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 23:49:20.130 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.130 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.130 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.146 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.151 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.163 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.172 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.173 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.173 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.173 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.174 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.174 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.174 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 23:49:20.175 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 23:49:20.175 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.181 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.181 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.181 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.183 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.185 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.185 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 23:49:20.186 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.195 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 BC 83 EB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 23:48:59.000 UTC",
#       "not  after"         : "2024-01-17 23:48:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 7B 45 B0 2B EA F1 15   DA 56 0A DD CB CC 1F 25  ..E.+....V.....%
#           0010: C3 3C 4F A2                                        .<O.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 38 D4 99 F1 5D 0C A1   90 78 D6 D5 C2 47 60 D4  .8...]...x...G`.
#           0010: 92 C4 E6 2C                                        ...,
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.198 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.333 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E B1 7E 6E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 23:48:55.000 UTC",
#     "not  after"         : "2024-01-17 23:48:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FA 9E 96 2A 26 43 3C 62   39 21 65 6B 71 BA CE A7  ...*&C<b9!ekq...
#         0010: 44 4B EF BB                                        DK..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 7B 45 B0 2B EA F1 15   DA 56 0A DD CB CC 1F 25  ..E.+....V.....%
#         0010: C3 3C 4F A2                                        .<O.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.353 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 76 5D CF 32 40 E2 A8 40   A7 43 62 62 D9 86 A3 27  v].2@..@.Cbb...'
#     0010: 65 91 F4 BC 4E 23 D1 9C   F0 C5 FE 5F D3 08 4B 12  e...N#....._..K.
#     0020: 4F E7 08 F0 E9 6F 4D CD   40 F7 90 01 D4 CB 46 0C  O....oM.@.....F.
#     0030: 99 31 CD 56 B3 62 CE CC   F8 C1 D3 FB AA D3 86 E6  .1.V.b..........
#     0040: 17 24 F8 B2 CD F3 A3 DE   D8 83 BE 1F 92 38 D5 9E  .$...........8..
#     0050: BF D0 5B 59 6E 49 36 47   4F 9C 4A 89 47 5C C0 13  ..[YnI6GO.J.G\..
#     0060: E1 2D CD 8A 33 08 96 2C   EC 96 77 7D B5 15 53 F5  .-..3..,..w...S.
#     0070: E8 C2 69 B0 5B 86 94 C8   D3 09 DB 21 25 EF 45 CD  ..i.[......!%.E.
#     0080: E2 EF 8C E0 62 54 89 8A   FF F6 92 59 D2 B2 96 6D  ....bT.....Y...m
#     0090: 1A 2A 9D BF 21 11 F8 7F   05 3A 80 9A 86 E8 4F BC  .*..!....:....O.
#     00A0: E0 E3 D7 6D 7E 87 CF 55   88 4A 18 B4 08 44 21 5F  ...m...U.J...D!_
#     00B0: AF 89 9C EE E2 46 14 9F   BA 66 F2 98 58 79 FD 2B  .....F...f..Xy.+
#     00C0: BC CF 36 4F B4 3C 76 F8   5E A4 59 D9 9C D8 94 6D  ..6O.<v.^.Y....m
#     00D0: 23 B7 55 E5 66 51 26 6A   92 C2 3F 46 C1 49 32 CE  #.U.fQ&j..?F.I2.
#     00E0: 67 3F A7 23 01 BD FF EE   E1 66 7C 99 11 41 62 45  g?.#.....f...AbE
#     00F0: DD D0 B3 48 D9 F6 D7 CB   28 62 35 F8 1D 1C C7 26  ...H....(b5....&
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.355 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CD 42 3D F2 12 26 47 4D   62 FA 1C AA EF 21 5B 32  .B=..&GMb....![2
#     0010: D7 CA 05 C4 54 28 3E 4D   1C 01 CF A2 2D 65 AC CD  ....T(>M....-e..
#     0020: E5 C8 DA 8F B5 73 6C 07   86 F3 C9 54 5B 41 A5 CE  .....sl....T[A..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.366 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 23:49:20.367 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 23:49:20.368 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 23:49:20.368 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 23:49:20.368 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 23:49:20.368 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 23:49:20.368 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.368 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.771 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 C8 01 35",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 23:49:03.000 UTC",
#       "not  after"         : "2024-01-17 23:49:03.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 7B 45 B0 2B EA F1 15   DA 56 0A DD CB CC 1F 25  ..E.+....V.....%
#           0010: C3 3C 4F A2                                        .<O.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C 0C 3B 00 35 A7 16 B4   CD C8 E3 3D FF 2B B5 C9  ..;.5......=.+..
#           0010: 0B A8 67 3E                                        ..g>
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E B1 7E 6E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 23:48:55.000 UTC",
#       "not  after"         : "2024-01-17 23:48:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FA 9E 96 2A 26 43 3C 62   39 21 65 6B 71 BA CE A7  ...*&C<b9!ekq...
#           0010: 44 4B EF BB                                        DK..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 7B 45 B0 2B EA F1 15   DA 56 0A DD CB CC 1F 25  ..E.+....V.....%
#           0010: C3 3C 4F A2                                        .<O.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.802 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 80 73 16 29 A9 BE A7 90   FE 31 37 B1 A2 C1 D6 0F  .s.).....17.....
#     0010: 17 9E 88 36 E6 72 9E 71   95 DC 09 46 88 E6 2C C9  ...6.r.q...F..,.
#     0020: 21 32 76 ED 94 FF 82 A7   C5 78 47 FC A1 E6 8C 1E  !2v......xG.....
#     0030: E6 08 AD 19 09 67 7A 79   71 A4 4A 46 53 FD EA EA  .....gzyq.JFS...
#     0040: 0C 8A 70 66 20 A2 F1 49   70 20 8C 24 F3 0F A8 E6  ..pf ..Ip .$....
#     0050: D7 FF 76 CF 75 E9 6C DC   0B 84 FB C0 31 CD 0F A0  ..v.u.l.....1...
#     0060: 6C 5C D3 6F C0 68 6B B3   ED A8 99 37 77 73 3F D2  l\.o.hk....7ws?.
#     0070: 5A BC AF 31 A8 93 2E 36   13 EA 7B 4A 59 CB 2E 84  Z..1...6...JY...
#     0080: 5A D1 EF CB 80 CF 5B 43   93 B7 82 2A 07 1D 78 2E  Z.....[C...*..x.
#     0090: 0E 3E 2D A0 12 0A EC F1   E6 BE C7 7D F3 ED AC 4A  .>-............J
#     00A0: F7 0E E2 15 71 DE 7F 9C   61 57 48 BF 40 01 A9 A2  ....q...aWH.@...
#     00B0: 54 E6 CD 1F 89 C7 44 E8   9C A6 FB 93 58 BE 04 85  T.....D.....X...
#     00C0: 1F F6 8E 97 52 61 27 C4   40 D4 05 73 BC 20 54 25  ....Ra'.@..s. T%
#     00D0: 73 96 54 E9 9D AE 09 B3   7A 12 B6 D4 DC C3 42 CC  s.T.....z.....B.
#     00E0: 0F BF 7B AA EE 40 1A CA   D8 0A 73 94 DE 16 94 DB  .....@....s.....
#     00F0: 1A 6D D4 59 B3 3F BB CA   78 42 DA 77 B9 FB 86 93  .m.Y.?..xB.w....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.805 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 82 3D 64 B6 1A 6A 4E 99   8C F2 9C BE 12 14 26 8E  .=d..jN.......&.
#     0010: 0E 3E 91 2A F0 14 05 03   09 32 F3 5D 0C A8 E2 0A  .>.*.....2.]....
#     0020: B5 B0 3C EF DD E5 B6 33   D6 1C 5A D9 AD AD 2E 3E  ..<....3..Z....>
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.810 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 23:49:20.862 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 23:49:20.862 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 23:49:20.862 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 23:49:20.862 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 23:49:20.925 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FE D1 8D B8 F9 EB 3F B4 3F 8A 9F 74 E7 05 B1 C7 F1 0F C4 11 AE 5A F8 B3 54 0A F6 53 82 5E 93 65",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 23:49:21.189 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 23:49:21.191 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 23:49:22.301; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 23:49:22.306; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 23:49:22.846; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-qxxKrb/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qxxKrb/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 23:49:22.848; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-qxxKrb/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qxxKrb/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 23:49:22.848; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(ca,h=[localhost],a=[],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-qxxKrb/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qxxKrb/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 23:49:22.885 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 C8 01 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 23:49:03.000 UTC",
#     "not  after"         : "2024-01-17 23:49:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 7B 45 B0 2B EA F1 15   DA 56 0A DD CB CC 1F 25  ..E.+....V.....%
#         0010: C3 3C 4F A2                                        .<O.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C 0C 3B 00 35 A7 16 B4   CD C8 E3 3D FF 2B B5 C9  ..;.5......=.+..
#         0010: 0B A8 67 3E                                        ..g>
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E B1 7E 6E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 23:48:55.000 UTC",
#     "not  after"         : "2024-01-17 23:48:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FA 9E 96 2A 26 43 3C 62   39 21 65 6B 71 BA CE A7  ...*&C<b9!ekq...
#         0010: 44 4B EF BB                                        DK..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 7B 45 B0 2B EA F1 15   DA 56 0A DD CB CC 1F 25  ..E.+....V.....%
#         0010: C3 3C 4F A2                                        .<O.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 23:49:22.889 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 33 2F 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 23:48:52.000 UTC",
#     "not  after"         : "2024-01-17 23:48:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FA 9E 96 2A 26 43 3C 62   39 21 65 6B 71 BA CE A7  ...*&C<b9!ekq...
#         0010: 44 4B EF BB                                        DK..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E B1 7E 6E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 23:48:55.000 UTC",
#     "not  after"         : "2024-01-17 23:48:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FA 9E 96 2A 26 43 3C 62   39 21 65 6B 71 BA CE A7  ...*&C<b9!ekq...
#         0010: 44 4B EF BB                                        DK..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 7B 45 B0 2B EA F1 15   DA 56 0A DD CB CC 1F 25  ..E.+....V.....%
#         0010: C3 3C 4F A2                                        .<O.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 23:49:22.900 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 23:49:23.057 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 23:49:23.057 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 23:49:23.059 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 23:49:23.059 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 23:49:23.063 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 23:49:23.073 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 23:49:23.073 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 23:49:23.073 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 23:49:23.075 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2C 3A 33 75 BF 25 DB 88 DC B4 19 D6 F5 8F CF 71 EE 1B 97 69 49 CB 9C 10 ED E4 A5 82 98 20 10 D9",
#   "session id"          : "5A 26 C5 65 47 07 BA 60 31 48 2D 94 F2 5B 77 F0 66 96 36 BF 29 5E 67 F6 52 2B 45 50 32 13 E1 D6",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
# 

[...truncated too long message...]

     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 23:50:06.117 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 00 E3 8A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 23:49:37.000 UTC",
#     "not  after"         : "2024-01-17 23:49:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED F2 F6 94 88 21 8C 94   72 BA 54 A9 27 39 FA 9F  .....!..r.T.'9..
#         0010: 47 73 02 CC                                        Gs..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 23 81 48 CE 57 3A 50   D9 B7 5F 8A DC 28 18 E0  _#.H.W:P.._..(..
#         0010: E5 08 BC 50                                        ...P
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 9E 7F 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 23:49:35.000 UTC",
#     "not  after"         : "2024-01-17 23:49:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED F2 F6 94 88 21 8C 94   72 BA 54 A9 27 39 FA 9F  .....!..r.T.'9..
#         0010: 47 73 02 CC                                        Gs..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 23:50:06.128 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14275ms
ok 65 stop command for single port in 16662ms
not ok 66 status detects locally running solr in 3339ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 23192 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 28715 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 23192 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 225ms
ok 68 listing out files in 2862ms
ok 69 copying files around in 10477ms
ok 70 upconfig in 2630ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1197ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1193ms
not ok 73 Cleanup in 4378ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 23192 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 28715 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 23192 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 37s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/uqkvqzkj5qmx2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 863 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/863/

All tests passed

Build Log:
[...truncated 1319 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:38775/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 21:23:57.408; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 21:23:57.413; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 21:23:58.190; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 21:23:58.326; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 16941ms
ok 61 start solr with client truststore and security manager in 19937ms
not ok 62 start solr with mTLS needed in 52393ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-uPGB0L/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 38775 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38775 (pid=1613435). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 38776 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 38776 (pid=1613550). Happy searching!
#
#     INFO  - 2023-10-19 21:25:00.962; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 21:25:00.977; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 21:25:02.022; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-uPGB0L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-uPGB0L/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 21:25:02.025; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-uPGB0L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-uPGB0L/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 21:25:02.029; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-uPGB0L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-uPGB0L/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 21:25:02.095 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "25 88 BC C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 21:24:47.000 UTC",
#     "not  after"         : "2024-01-17 21:24:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#         0010: F3 90 49 13                                        ..I.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 66 12 7C 51 14 84 0F   10 46 84 DE 1A 85 3E 70  .f..Q....F....>p
#         0010: 09 01 76 76                                        ..vv
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 C7 88 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 21:24:40.000 UTC",
#     "not  after"         : "2024-01-17 21:24:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 C0 65 8E 73 15 50 A5   AC 52 47 97 2A 50 2C A2  ..e.s.P..RG.*P,.
#         0010: 40 FA 90 05                                        @...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#         0010: F3 90 49 13                                        ..I.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 21:25:02.101 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 C7 88 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 21:24:40.000 UTC",
#     "not  after"         : "2024-01-17 21:24:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 C0 65 8E 73 15 50 A5   AC 52 47 97 2A 50 2C A2  ..e.s.P..RG.*P,.
#         0010: 40 FA 90 05                                        @...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#         0010: F3 90 49 13                                        ..I.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0C 23 E7 D5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 21:24:38.000 UTC",
#     "not  after"         : "2024-01-17 21:24:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 C0 65 8E 73 15 50 A5   AC 52 47 97 2A 50 2C A2  ..e.s.P..RG.*P,.
#         0010: 40 FA 90 05                                        @...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 21:25:02.116 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 21:25:02.515 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 21:25:02.515 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 21:25:02.516 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 21:25:02.516 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 21:25:02.605 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:02.606 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 21:25:02.612 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 21:25:02.613 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:02.620 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:02.643 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:02.643 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:02.643 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:02.645 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "39 50 05 E5 CA 14 DB E6 49 FD 23 91 22 E5 08 64 BF C0 BD 19 76 8A 74 02 49 3A 12 01 9E 4A 73 2E",
#   "session id"          : "AF 88 89 6D 4E F8 D1 9C 73 4A 95 66 63 49 26 4F 77 ED 1D 89 80 AB 1F DF D3 05 AD D4 E0 4B F8 A4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B7 85 5E 12 AE A6 20 00   F5 2F B8 03 AD 97 86 E5  ..^... ../......
#             0010: 38 AC 5A FA 43 D3 FC C6   15 EF C2 B8 26 CD 94 62  8.Z.C.......&..b
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.117 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4E 7C 60 3D 2C D3 B3 1F A5 20 48 2D 2B D9 BC C9 4F 8B 8F 0A 00 03 AB A1 62 FD 09 E9 35 33 46 B2",
#   "session id"          : "AF 88 89 6D 4E F8 D1 9C 73 4A 95 66 63 49 26 4F 77 ED 1D 89 80 AB 1F DF D3 05 AD D4 E0 4B F8 A4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 7D 6F 53 F8 21 2B 88 25   A8 A7 90 A0 57 9E 44 D1  .oS.!+.%....W.D.
#           0010: 0C D5 62 73 23 8D FF 5E   18 33 9E 56 6C 5E CB 08  ..bs#..^.3.Vl^..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.117 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.118 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.129 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.129 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.129 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.135 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.136 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.136 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:03.137 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:03.137 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.146 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.147 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.149 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.160 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.161 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.161 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.161 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.168 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.168 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.168 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:03.168 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:03.169 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.174 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.174 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.174 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.175 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.175 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.176 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:03.176 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.190 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 C8 2B B5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 21:24:43.000 UTC",
#       "not  after"         : "2024-01-17 21:24:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#           0010: F3 90 49 13                                        ..I.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 84 AF E5 91 79 C8 4D   CC E6 74 F8 61 D7 05 9A  .....y.M..t.a...
#           0010: DA F7 A1 BB                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.191 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.310 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 C7 88 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 21:24:40.000 UTC",
#     "not  after"         : "2024-01-17 21:24:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 C0 65 8E 73 15 50 A5   AC 52 47 97 2A 50 2C A2  ..e.s.P..RG.*P,.
#         0010: 40 FA 90 05                                        @...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#         0010: F3 90 49 13                                        ..I.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.323 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0A 3E DA CF C5 2E A4 DC   64 8C 08 D4 95 93 82 67  .>......d......g
#     0010: A5 6F E9 5A 5E 35 D6 B5   E8 2B 36 D1 CE E4 B0 90  .o.Z^5...+6.....
#     0020: A8 24 EB 81 5C 1F F1 88   FC 05 13 78 1B B5 7A 51  .$..\......x..zQ
#     0030: 10 61 EA AF 80 3B 28 EF   8D 39 88 82 C9 84 2A BF  .a...;(..9....*.
#     0040: 10 91 74 C3 3A 20 0B 5B   2D 70 09 50 CB E2 62 86  ..t.: .[-p.P..b.
#     0050: A5 49 14 31 DC 63 05 56   FC 04 AE 40 79 9A 5F 17  .I.1.c.V...@y._.
#     0060: 35 43 98 8B 39 66 C7 DD   8D 2D 06 AE 59 5A 30 A1  5C..9f...-..YZ0.
#     0070: 72 11 88 7C 56 35 B6 B6   46 AA 06 0A BF 7F 89 34  r...V5..F......4
#     0080: E3 CB EE 03 1D 63 FB FA   8E 1C 35 A7 63 9C C8 2D  .....c....5.c..-
#     0090: 71 68 CB AD E1 4F D9 E1   2D 76 CD CF 57 3E F8 90  qh...O..-v..W>..
#     00A0: CA 0B B3 6B 2A 14 80 78   3C 05 B5 3F EC 93 1A D2  ...k*..x<..?....
#     00B0: E1 17 8A 36 A8 57 86 5E   A6 9A D0 58 D7 5B D8 E1  ...6.W.^...X.[..
#     00C0: 99 8F A6 22 8E 93 F2 FF   63 66 8B 56 E5 B0 63 E8  ..."....cf.V..c.
#     00D0: CE 11 AF 13 45 82 1C 8F   6A C5 BD E1 D1 CE 9A AD  ....E...j.......
#     00E0: 51 65 42 FA 20 18 57 E9   95 D1 23 93 F5 48 9F B4  QeB. .W...#..H..
#     00F0: 3C DD B2 E2 84 93 B7 BD   4B BF D0 14 D3 0E 50 C6  <.......K.....P.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.325 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D1 E4 4E C6 8E 1F 89 DA   B1 F8 0F 36 B1 42 87 25  ..N........6.B.%
#     0010: 4B FB 62 47 83 75 A8 AF   46 A6 13 76 6B BD DD 22  K.bG.u..F..vk.."
#     0020: 5F 53 95 21 A7 6A CF 5A   01 78 F7 16 CE 35 FE 22  _S.!.j.Z.x...5."
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.328 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 21:25:03.328 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:03.329 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 21:25:03.329 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:03.329 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 21:25:03.330 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:03.330 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.330 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.332 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "25 88 BC C3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 21:24:47.000 UTC",
#       "not  after"         : "2024-01-17 21:24:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#           0010: F3 90 49 13                                        ..I.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 66 12 7C 51 14 84 0F   10 46 84 DE 1A 85 3E 70  .f..Q....F....>p
#           0010: 09 01 76 76                                        ..vv
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 C7 88 CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 21:24:40.000 UTC",
#       "not  after"         : "2024-01-17 21:24:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 C0 65 8E 73 15 50 A5   AC 52 47 97 2A 50 2C A2  ..e.s.P..RG.*P,.
#           0010: 40 FA 90 05                                        @...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#           0010: F3 90 49 13                                        ..I.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.394 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 72 0A 26 BB E7 3A A5 90   B1 35 9B 5D EE C9 AA 3F  r.&..:...5.]...?
#     0010: 6F 4B CE B7 DD A6 F0 95   73 91 BF F6 5A 0E 7A 83  oK......s...Z.z.
#     0020: A6 B2 A3 58 41 23 D6 27   E2 8B 3E 6D 3F 6B A0 BF  ...XA#.'..>m?k..
#     0030: 41 F9 FA C0 A0 31 3F 3A   5D F4 6C 46 FF 5F 93 E2  A....1?:].lF._..
#     0040: 16 F0 33 A5 47 35 22 71   CF 43 71 AD C4 84 A2 10  ..3.G5"q.Cq.....
#     0050: 6F BF 56 7F F3 E9 CE ED   86 F3 C4 00 2D E7 27 40  o.V.........-.'@
#     0060: 4B 80 44 19 52 7F BF 5E   A7 75 F2 4E 58 1B BC 15  K.D.R..^.u.NX...
#     0070: 30 97 58 7D CB 9C EF 96   86 10 A8 C3 68 F0 9F 54  0.X.........h..T
#     0080: 41 D1 B6 13 90 77 EF B2   42 C0 C9 76 7A 14 82 E0  A....w..B..vz...
#     0090: 99 A8 22 74 60 AF 7F A6   6D 43 E2 FB 23 F6 F3 36  .."t`...mC..#..6
#     00A0: 45 14 CB 47 2C 2F 82 79   2B F8 03 69 84 7B EC EB  E..G,/.y+..i....
#     00B0: B7 A4 AD A9 39 DD 45 C4   E6 F8 BA FF FF 75 D5 54  ....9.E......u.T
#     00C0: 02 3F BE 98 93 1A A2 E3   95 AE 72 E5 9A D8 C7 CE  .?........r.....
#     00D0: 00 FE 00 43 0D C6 52 EA   89 24 07 AD 7B 59 1D 16  ...C..R..$...Y..
#     00E0: FE B4 C0 A4 00 E8 93 C5   F0 40 50 7A F3 BA 25 BB  .........@Pz..%.
#     00F0: 9E EE 96 09 00 0C 59 6F   70 81 A7 56 A2 6B D8 D5  ......Yop..V.k..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.395 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 85 CD DF 9A E2 CD 89 D5   48 08 E4 8B 8F 74 E5 05  ........H....t..
#     0010: A0 12 46 D0 90 40 A1 A0   23 3A 5C A9 C3 70 4E 07  ..F..@..#:\..pN.
#     0020: DF 3F F8 37 26 49 89 2A   3F 5E C4 6D 0F DD C1 2C  .?.7&I.*?^.m...,
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.402 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:03.595 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F2 B3 CD 67 C0 24 D9 50 B5 3E FC C3 4E DF C5 C4 FD 97 11 4E D6 DD 44 9A F0 4D 0E B2 01 8A 72 2C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-19 21:25:04.784 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 21:25:04.790 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 21:25:04.790 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 21:25:06.080; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 21:25:06.085; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 21:25:06.484; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-uPGB0L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-uPGB0L/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 21:25:06.487; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-uPGB0L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-uPGB0L/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 21:25:06.487; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-uPGB0L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-uPGB0L/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 21:25:06.520 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "25 88 BC C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 21:24:47.000 UTC",
#     "not  after"         : "2024-01-17 21:24:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#         0010: F3 90 49 13                                        ..I.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 66 12 7C 51 14 84 0F   10 46 84 DE 1A 85 3E 70  .f..Q....F....>p
#         0010: 09 01 76 76                                        ..vv
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 C7 88 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 21:24:40.000 UTC",
#     "not  after"         : "2024-01-17 21:24:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 C0 65 8E 73 15 50 A5   AC 52 47 97 2A 50 2C A2  ..e.s.P..RG.*P,.
#         0010: 40 FA 90 05                                        @...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#         0010: F3 90 49 13                                        ..I.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 21:25:06.523 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 C7 88 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 21:24:40.000 UTC",
#     "not  after"         : "2024-01-17 21:24:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 C0 65 8E 73 15 50 A5   AC 52 47 97 2A 50 2C A2  ..e.s.P..RG.*P,.
#         0010: 40 FA 90 05                                        @...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#         0010: F3 90 49 13                                        ..I.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0C 23 E7 D5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 21:24:38.000 UTC",
#     "not  after"         : "2024-01-17 21:24:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 C0 65 8E 73 15 50 A5   AC 52 47 97 2A 50 2C A2  ..e.s.P..RG.*P,.
#         0010: 40 FA 90 05                                        @...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 21:25:06.536 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 21:25:06.638 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 21:25:06.638 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 21:25:06.639 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 21:25:06.639 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 21:25:06.733 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:06.733 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 21:25:06.735 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 21:25:06.735 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:06.739 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:06.751 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:06.751 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:06.751 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:06.753 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "4C B0 F9 14 07 2D D6 1D 3B 48 38 F0 ED 98 1D 87 39 DC 90 06 A9 73 FA 40 2C DC B2 6E 12 32 B4 FC",
#   "session id"          : "58 3B 5B 84 D3 77 5C E8 5E 1C 3E 01 5B 21 C3 91 E6 CA D9 ED 6C C4 47 31 5A 9A 62 66 30 85 25 B4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 09 FC 4A 7E 61 74 A1 26   32 8C 32 EB 41 D7 FF A2  ..J.at.&2.2.A...
#             0010: 04 AB DC 8C 11 4B 39 BA   8E 57 8E AE 48 0B 44 69  .....K9..W..H.Di
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.873 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "61 F9 47 03 3D 4E 2F 0F 7E B5 35 5C 77 B3 F5 65 9D AB FD A7 45 E5 9C 3B F8 B5 8C 18 70 5B A4 60",
#   "session id"          : "58 3B 5B 84 D3 77 5C E8 5E 1C 3E 01 5B 21 C3 91 E6 CA D9 ED 6C C4 47 31 5A 9A 62 66 30 85 25 B4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: EF D7 47 99 6A 63 F7 5C   76 B4 10 2A ED 33 95 A5  ..G.jc.\v..*.3..
#           0010: 28 06 45 C1 89 51 67 23   7E DC CC 49 74 C1 0F 08  (.E..Qg#...It...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.873 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.874 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.874 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.874 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.874 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.875 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.875 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.875 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.875 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.875 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.877 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.877 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.877 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.877 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.877 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.877 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.877 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.878 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.878 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.878 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:06.878 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:06.878 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.878 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.878 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.903 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.904 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.906 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.909 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.909 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.909 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.909 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.910 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.910 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.910 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:06.910 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:06.910 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.911 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.911 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.911 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.928 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.931 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.932 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:06.932 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.940 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 C8 2B B5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 21:24:43.000 UTC",
#       "not  after"         : "2024-01-17 21:24:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#           0010: F3 90 49 13                                        ..I.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 84 AF E5 91 79 C8 4D   CC E6 74 F8 61 D7 05 9A  .....y.M..t.a...
#           0010: DA F7 A1 BB                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:06.941 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:07.114 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 C7 88 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 21:24:40.000 UTC",
#     "not  after"         : "2024-01-17 21:24:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 C0 65 8E 73 15 50 A5   AC 52 47 97 2A 50 2C A2  ..e.s.P..RG.*P,.
#         0010: 40 FA 90 05                                        @...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#         0010: F3 90 49 13                                        ..I.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:07.117 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 60 BE 92 34 03 39 99 49   09 4E C6 70 9D 2B 43 CF  `..4.9.I.N.p.+C.
#     0010: 32 D4 38 F8 84 88 F4 BE   42 6D 98 9C 2B FD F0 F5  2.8.....Bm..+...
#     0020: F9 51 8E 42 C6 9B 17 DB   BA EE 59 94 C6 D1 24 6F  .Q.B......Y...$o
#     0030: A0 1D 42 E9 18 82 28 0B   82 DA C7 86 68 EF A4 43  ..B...(.....h..C
#     0040: F7 37 2F D8 F4 F0 FA 4B   92 14 75 8D 32 17 4D 98  .7/....K..u.2.M.
#     0050: A3 9C 20 BD EE C6 18 C3   A6 79 56 8D 78 45 98 41  .. ......yV.xE.A
#     0060: 14 75 B8 39 18 1C 97 F7   0C 6D 80 75 17 5F 66 36  .u.9.....m.u._f6
#     0070: 92 85 F0 73 9B 8D D9 20   08 6D 29 8C 48 67 D3 3D  ...s... .m).Hg.=
#     0080: EB B3 15 81 D7 8E 57 AC   6C 9D 51 20 F6 C6 02 FE  ......W.l.Q ....
#     0090: 7F 47 3C 86 DA EA E5 B2   B8 67 B3 94 10 05 81 C6  .G<......g......
#     00A0: C7 8D 4F 4C 83 B9 FE A1   0E 41 EE 18 90 8F 58 EC  ..OL.....A....X.
#     00B0: FD A7 DF 21 22 BB 93 7E   6C 24 83 2D 4C C8 60 B5  ...!"...l$.-L.`.
#     00C0: 1C 8B 3B 22 3E CA 1A 42   66 E3 E1 88 C6 8C 3D 3B  ..;">..Bf.....=;
#     00D0: 18 7B FD DF 90 42 0F AA   76 22 75 3E CE 86 62 DC  .....B..v"u>..b.
#     00E0: B1 01 9B F9 70 BE 49 6B   E9 50 47 1B 6B A1 91 82  ....p.Ik.PG.k...
#     00F0: EA 6F 62 54 06 7F CD D2   53 20 83 D5 8C 72 41 66  .obT....S ...rAf
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:07.119 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 83 54 16 EE 66 E3 DC 09   09 24 D5 10 64 63 D2 E8  .T..f....$..dc..
#     0010: A0 43 5B E9 B4 13 BC E4   CE 16 CF 5E 86 3D 1C 73  .C[........^.=.s
#     0020: 1A D2 0A E4 CC E7 19 5A   73 B8 B8 6C 73 5E 7E 29  .......Zs..ls^.)
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:07.121 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 21:25:07.122 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:07.122 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 21:25:07.122 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:07.122 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 21:25:07.122 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:07.122 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:07.123 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:07.124 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "25 88 BC C3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 21:24:47.000 UTC",
#       "not  after"         : "2024-01-17 21:24:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#           0010: F3 90 49 13                                        ..I.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 66 12 7C 51 14 84 0F   10 46 84 DE 1A 85 3E 70  .f..Q....F....>p
#           0010: 09 01 76 76                                        ..vv
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 C7 88 CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 21:24:40.000 UTC",
#       "not  after"         : "2024-01-17 21:24:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 C0 65 8E 73 15 50 A5   AC 52 47 97 2A 50 2C A2  ..e.s.P..RG.*P,.
#           0010: 40 FA 90 05                                        @...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#           0010: F3 90 49 13                                        ..I.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:07.155 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 53 06 52 45 AE 79 A5 A9   D8 AF 55 BA 41 0F EB F5  S.RE.y....U.A...
#     0010: 5B 47 C1 9B B5 19 B7 85   99 EF 3A C5 E1 55 C5 50  [G........:..U.P
#     0020: 2D 2C 5A 8D 68 F6 AA EB   75 A9 94 CF 63 8A DC E5  -,Z.h...u...c...
#     0030: CF 44 4C D5 D5 70 4C D6   D6 5C C2 BF E3 51 59 92  .DL..pL..\...QY.
#     0040: 29 F7 8E F1 53 E2 CD 6D   F3 52 14 F0 1B AB 5F DC  )...S..m.R...._.
#     0050: 3D 4C 2F 91 AD 40 F5 86   0B 21 1D 4E E9 A4 6F 92  =L/..@...!.N..o.
#     0060: D2 BD DB CD 0F BE 21 09   5D 5D BE 3D E2 91 8C 6E  ......!.]].=...n
#     0070: 0D CB 28 CB 48 3F 91 8F   26 99 6B 5E 06 4E CF 4F  ..(.H?..&.k^.N.O
#     0080: 3F A2 77 2B 7A 3C DD 59   62 30 FD CA 9C 9D 7F BE  ?.w+z<.Yb0......
#     0090: D4 E9 14 B6 5A C8 A8 ED   6B F0 B7 A8 53 96 02 88  ....Z...k...S...
#     00A0: 95 8D D9 9E 1D 1B 6A 7D   AA F8 31 BE DA 78 08 0D  ......j...1..x..
#     00B0: 29 AB 16 9E 26 97 62 69   A7 D0 93 80 F2 C5 76 EA  )...&.bi......v.
#     00C0: 8E 86 86 8C C2 C2 E7 C9   42 47 BE F8 AC CD 44 2D  ........BG....D-
#     00D0: 2D F3 65 9E 34 A5 6B B6   66 FD 7B 05 AE 60 7F A2  -.e.4.k.f....`..
#     00E0: 80 9E 13 78 57 F4 E9 D6   3D 94 B7 84 DA 70 2D 0A  ...xW...=....p-.
#     00F0: DF 0B 25 07 78 FC 9B 28   E1 B7 7B 25 DA 60 B7 25  ..%.x..(...%.`.%
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:07.157 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7D 5E D7 31 3C B2 61 CE   52 0C C9 7B 1D 6D 05 08  .^.1<.a.R....m..
#     0010: DC 58 5B B4 93 E0 08 D3   50 DF 9B A7 2A E6 61 B5  .X[.....P...*.a.
#     0020: 32 5D 93 F4 F7 80 36 66   38 A9 80 9C FE 24 78 BE  2]....6f8....$x.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:07.157 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:07.208 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5A F0 06 9D BE FA AB BC 9C 63 EC 42 F7 3C 09 0F 0E F4 78 92 59 2F 39 B1 9B EE 30 A9 52 AB 54 12",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 21:25:07.518 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 21:25:07.520 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-19 21:25:20.748; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 21:25:21.154 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 C7 88 CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 21:24:40.000 UTC",
#       "not  after"         : "2024-01-17 21:24:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 C0 65 8E 73 15 50 A5   AC 52 47 97 2A 50 2C A2  ..e.s.P..RG.*P,.
#           0010: 40 FA 90 05                                        @...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B 09 22 97 51 95 8F 40   0F AD A3 62 63 67 EE 94  ..".Q..@...bcg..
#           0010: F3 90 49 13                                        ..I.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0C 23 E7 D5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 21:24:38.000 UTC",
#       "not  after"         : "2024-01-17 21:24:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 C0 65 8E 73 15 50 A5   AC 52 47 97 2A 50 2C A2  ..e.s.P..RG.*P,.
#           0010: 40 FA 90 05                                        @...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 21:25:21.167 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 21:25:21.323 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:21.323 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 21:25:21.325 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 21:25:21.325 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:21.329 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:21.341 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:21.341 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:21.341 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 21:25:21.343 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "62 E3 7A A6 96 F9 70 59 4E E2 61 93 73 DE 66 05 88 A3 19 26 D2 AF E9 A3 BF F7 1A C1 7F 3A F9 43",
#     "session id"          : "AF B9 62 F4 67 25 25 DA 14 4F A7 58 B5 03 07 E0 B5 43 C9 44 D3 2C F5 08 FB 0B 1F 47 B2 48 1C CA",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 39 4F 0E B9 44 9B 52 CB   D0 37 54 94 48 E5 D7 C4  9O..D.R..7T.H...
#               0010: B0 33 4C 4E A7 16 A7 07   A3 09 4D DA 75 8F 00 4A  .3LN......M.u..J
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.359 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "42 D6 23 97 D9 2D A2 05 C9 49 13 B7 DB 9B 96 BF F4 55 C4 72 8B 9D C3 0F E6 C8 14 13 7E 7F 22 28",
#     "session id"          : "AF B9 62 F4 67 25 25 DA 14 4F A7 58 B5 03 07 E0 B5 43 C9 44 D3 2C F5 08 FB 0B 1F 47 B2 48 1C CA",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5A 40 13 29 F0 FD DC 4B   3D 4F 6E D9 27 95 9B 5D  Z@.)...K=On.'..]
#             0010: E5 1A 97 AC AE 3E 81 0F   59 4E 4C 7A CE 19 AF 0C  .....>..YNLz....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.360 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.360 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.360 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.361 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.361 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.361 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.361 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.361 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.361 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.361 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.363 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.363 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.363 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.363 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.363 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.363 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.363 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.364 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.364 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:21.364 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:21.364 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.364 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.364 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.370 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.371 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.372 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.376 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.376 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.377 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.377 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.377 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:21.377 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:21.377 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.378 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.378 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.379 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.379 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.379 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 21:25:21.380 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:25:21.380 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2

[...truncated too long message...]

ath to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 21:26:35.896 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:38776/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14647ms
ok 65 stop command for single port in 17659ms
not ok 66 status detects locally running solr in 1491ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 243ms
ok 68 listing out files in 3124ms
ok 69 copying files around in 6567ms
ok 70 upconfig in 2562ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1243ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1235ms
not ok 73 Cleanup in 2534ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 34s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/k7f4hmgcmezgw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 862 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/862/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 195862ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 2944ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-19 17:01:38.392; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 17:01:38.443; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1084ms
not ok 8 accept d option with builtin config in 3256ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-19 17:01:41.656; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 17:01:42.803; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 3334ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-19 17:01:45.019; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 17:01:46.173; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2090ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-19 17:01:48.255; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 17:01:48.302; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 3272ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-19 17:01:50.403; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 17:01:51.554; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2095ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-19 17:01:53.665; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 17:01:53.717; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2127ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-19 17:01:55.829; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 17:01:55.872; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 14 can delete collections in 12257ms
ok 15 collection delete also deletes zk config in 12717ms
ok 16 deletes accompanying zk config with nondefault name in 9367ms
ok 17 deleteConfig option can opt to leave config in zk in 8295ms
ok 18 SOLR-16755 test works with noprompt in 24602ms
ok 19 Check export command in 22565ms
ok 20 export fails on non cloud mode in 9680ms
not ok 21 using curl to extract a single pdf file in 9680ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 40827 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40827 (pid=1439). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-19 17:03:49.338; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 17:03:50.487; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8045ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 40827 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40827 (pid=1887). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-19 17:03:58.529; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 17:03:58.580; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 9650ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 40827 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40827 (pid=2351). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-19 17:04:07.108; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 17:04:08.262; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 29748ms
ok 25 start help flag prints help in 157ms
ok 26 stop help flag prints help in 158ms
ok 27 restart help flag prints help in 160ms
ok 28 status help flag prints help in 50ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 149ms
ok 30 create help flag prints help in 154ms
ok 31 createcore help flag prints help in 153ms
ok 32 createcollection help flag prints help in 153ms
ok 33 delete help flag prints help in 153ms
ok 34 version help flag prints help in 50ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 155ms
ok 36 auth help flag prints help in 159ms
ok 37 assert help flag prints help in 874ms
ok 38 post help flag prints help in 906ms
ok 39 SQL Module in 18346ms
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 20919ms
ok 41 icu collation in analysis-extras module in 12202ms
not ok 42 package detects no running solr in 1291ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 28715 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9511ms
ok 44 deploying and undeploying a collection level package in 13252ms
ok 45 Affinity placement plugin using sysprop in 16584ms
ok 46 Random placement plugin using ENV in 17769ms
ok 47 Check help command in 3584ms
ok 48 basic post with a type specified in 5893ms
ok 49 basic post WITHOUT a type specified in 12007ms
ok 50 crawling a directory in 4463ms
ok 51 crawling a web site in 4975ms
ok 52 commit and optimize and delete in 3940ms
ok 53 args mode in 6184ms
ok 54 stdin mode in 3316ms
not ok 55 post solr log into solr via script in 4998ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-19 17:07:30.428; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 17:07:31.860; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2207ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-19 17:07:34.075; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 17:07:34.131; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10205ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:40827/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-2ql1IX%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-19 17:07:44.373; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 17:07:44.429; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:40827/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-2ql1IX%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 13121ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 40827 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40827 (pid=12600). Happy searching!
#
#     INFO  - 2023-10-19 17:07:51.601; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 17:07:51.605; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 17:07:52.326; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-2ql1IX/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2ql1IX/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 17:07:55.577; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 17:07:55.581; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-19 17:07:57.026; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 17:07:57.040; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13537ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 40827 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40827 (pid=13177). Happy searching!
#
#     INFO  - 2023-10-19 17:08:04.693; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 17:08:04.698; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 17:08:05.122; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@44c79f32(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-2ql1IX/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2ql1IX/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 17:08:05.553; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-2ql1IX/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2ql1IX/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 17:08:05.553; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-2ql1IX/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2ql1IX/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 17:08:08.766; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 17:08:08.771; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-19 17:08:09.138; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@302fec27[provider=null,keyStore=file:///tmp/bats-run-2ql1IX/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2ql1IX/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-19 17:08:09.140; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@302fec27[provider=null,keyStore=file:///tmp/bats-run-2ql1IX/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2ql1IX/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 17:08:10.176; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 17:08:10.180; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 17:08:10.813; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-2ql1IX/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2ql1IX/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 17:08:10.814; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-2ql1IX/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2ql1IX/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10502ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 40827 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40827 (pid=13812). Happy searching!
#
#     INFO  - 2023-10-19 17:08:18.232; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 17:08:18.237; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-19 17:08:21.122; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 17:08:21.127; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13493ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-19 17:08:29.688; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 17:08:33.544; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-19 17:08:35.096; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 40971ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-2ql1IX/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40827 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40827 (pid=15503). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40828 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 40828 (pid=15614). Happy searching!
#
#     INFO  - 2023-10-19 17:09:00.726; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 17:09:00.733; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 17:09:01.170; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-2ql1IX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2ql1IX/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 17:09:01.172; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-2ql1IX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2ql1IX/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 17:09:01.172; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(ca,h=[localhost],a=[],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-2ql1IX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2ql1IX/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 17:09:01.216 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 A2 71 A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 17:08:46.000 UTC",
#     "not  after"         : "2024-01-17 17:08:46.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 B2 5E F7 12 4B 5C 6B   81 C5 F4 10 B9 90 AA 2E  `.^..K\k........
#         0010: EE 6E 58 DB                                        .nX.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F C8 55 BC D3 AE F0 64   F7 8D 2A 88 10 93 7A 1E  ..U....d..*...z.
#         0010: 3D 14 3F 28                                        =.?(
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6A 39 FD BB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 17:08:40.000 UTC",
#     "not  after"         : "2024-01-17 17:08:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB B0 47 48 3B AC C1 91   EE B1 D1 89 45 21 D5 FC  ..GH;.......E!..
#         0010: C9 58 86 70                                        .X.p
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 B2 5E F7 12 4B 5C 6B   81 C5 F4 10 B9 90 AA 2E  `.^..K\k........
#         0010: EE 6E 58 DB                                        .nX.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 17:09:01.220 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 E2 A7 F0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 17:08:38.000 UTC",
#     "not  after"         : "2024-01-17 17:08:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BB B0 47 48 3B AC C1 91   EE B1 D1 89 45 21 D5 FC  ..GH;.......E!..
#         0010: C9 58 86 70                                        .X.p
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6A 39 FD BB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 17:08:40.000 UTC",
#     "not  after"         : "2024-01-17 17:08:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB B0 47 48 3B AC C1 91   EE B1 D1 89 45 21 D5 FC  ..GH;.......E!..
#         0010: C9 58 86 70                                        .X.p
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 B2 5E F7 12 4B 5C 6B   81 C5 F4 10 B9 90 AA 2E  `.^..K\k........
#         0010: EE 6E 58 DB                                        .nX.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 17:09:01.237 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 17:09:01.515 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 17:09:01.516 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 17:09:01.520 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 17:09:01.520 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 17:09:01.524 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 17:09:01.535 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 17:09:01.536 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 17:09:01.536 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 17:09:01.538 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "03 A7 B1 A8 D2 20 7A 86 96 2B 6C 9B BA 59 70 4C 63 29 1E 7F 25 08 66 13 01 EF E5 27 DB 22 A4 B2",
#   "session id"          : "27 8F 6B 90 CF 56 44 14 04 08 7C C7 FC 71 C7 3A 8C DD 23 AF 99 80 9E C9 48 89 52 2D 80 26 96 23",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 31 C5 7A CA 0E A5 09 6F   48 2C 3F FD 25 F6 4F 0F  1.z....oH,?.%.O.
#             0010: B3 7F 06 10 C9 95 28 20   D6 E7 2A 04 E4 31 D8 0D  ......( ..*..1..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:01.701 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2A B2 1F C8 70 D5 5D 56 E3 18 BE DE AD C9 58 05 06 C8 67 83 44 86 CB 6A CD A7 37 2D 93 33 43 C7",
#   "session id"          : "27 8F 6B 90 CF 56 44 14 04 08 7C C7 FC 71 C7 3A 8C DD 23 AF 99 80 9E C9 48 89 52 2D 80 26 96 23",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E7 9D 20 01 5A 13 1C 75   F1 0C 4C 25 48 C3 8B 01  .. .Z..u..L%H...
#           0010: E2 46 38 30 59 A3 57 96   91 F0 EF 96 2E CC 94 77  .F80Y.W........w
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:01.706 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.020 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.100 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.100 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.100 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.100 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.100 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.100 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.100 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.101 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.104 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.104 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.104 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.104 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.104 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.104 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.104 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.104 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.104 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.104 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 17:09:02.105 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 17:09:02.105 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.105 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.105 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.136 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.138 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.140 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.157 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.158 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.158 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.158 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.158 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 17:09:02.158 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 17:09:02.158 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.163 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.164 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.164 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.164 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.164 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.165 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 17:09:02.165 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.172 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E AB 06 22",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 17:08:42.000 UTC",
#       "not  after"         : "2024-01-17 17:08:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 B2 5E F7 12 4B 5C 6B   81 C5 F4 10 B9 90 AA 2E  `.^..K\k........
#           0010: EE 6E 58 DB                                        .nX.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D1 20 95 D2 1A 46 B4 0A   87 B2 36 02 51 F5 5E EC  . ...F....6.Q.^.
#           0010: 1E BE 53 F9                                        ..S.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.172 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.322 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6A 39 FD BB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 17:08:40.000 UTC",
#     "not  after"         : "2024-01-17 17:08:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB B0 47 48 3B AC C1 91   EE B1 D1 89 45 21 D5 FC  ..GH;.......E!..
#         0010: C9 58 86 70                                        .X.p
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 B2 5E F7 12 4B 5C 6B   81 C5 F4 10 B9 90 AA 2E  `.^..K\k........
#         0010: EE 6E 58 DB                                        .nX.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.339 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1D E3 B1 55 FD 26 DC 4F   46 14 37 AF 85 08 84 1C  ...U.&.OF.7.....
#     0010: 9E 6B DE 58 5E DD AE C5   F4 84 F5 44 2F 79 38 C8  .k.X^......D/y8.
#     0020: E1 BA 60 19 3E 8A E7 79   F5 8B EC 76 C7 91 EE C7  ..`.>..y...v....
#     0030: 23 5E AD 60 93 30 C2 21   B0 9A 2B 2F A0 BF 1E 31  #^.`.0.!..+/...1
#     0040: 8F D0 92 0B C2 0E B3 43   0B 06 5A 97 D1 5D BA 64  .......C..Z..].d
#     0050: 15 06 63 44 E8 0F 86 33   5A 61 A0 E9 75 4D 86 3C  ..cD...3Za..uM.<
#     0060: F2 04 5F 63 4C E4 F1 0E   72 B3 AF 23 14 56 0B 4F  .._cL...r..#.V.O
#     0070: 2F 9C 92 34 59 53 53 65   F7 FD 8F A3 A9 0C 6C 69  /..4YSSe......li
#     0080: 96 84 55 C6 A2 EA 1C 0D   08 01 75 1F F9 94 67 D9  ..U.......u...g.
#     0090: 43 26 44 31 4E 4D 0D 1A   6F 8F 55 14 FD A2 26 8A  C&D1NM..o.U...&.
#     00A0: 13 C4 FD 66 BB 56 DC 91   17 F8 89 FA 97 3E 99 45  ...f.V.......>.E
#     00B0: 1E BC 43 10 BD 51 62 E2   2D 13 F4 C1 C6 61 FC D5  ..C..Qb.-....a..
#     00C0: 55 31 B9 89 E0 61 1D C1   10 11 CD 9E 71 41 B4 82  U1...a......qA..
#     00D0: 12 0C 85 59 F0 D5 76 F8   AD B9 5A 4D 9C 09 75 41  ...Y..v...ZM..uA
#     00E0: 5C 1A 8B 1F E6 1B 07 65   46 AF 00 39 3E 32 D5 95  \......eF..9>2..
#     00F0: 70 4A 05 62 42 39 9F F6   77 57 A8 32 C1 E2 F8 37  pJ.bB9..wW.2...7
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.341 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 17 6D B9 E4 37 6F 94 E2   C4 CD 00 47 13 1D 74 73  .m..7o.....G..ts
#     0010: 57 BF 44 E1 44 74 8E 3E   1C 02 E0 6B 2A 70 1E 77  W.D.Dt.>...k*p.w
#     0020: 75 45 E9 1B B0 28 0C B0   39 BF 21 29 D9 3F 6D D0  uE...(..9.!).?m.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.350 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 17:09:02.351 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 17:09:02.351 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 17:09:02.352 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 17:09:02.352 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 17:09:02.352 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 17:09:02.352 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.357 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.359 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 A2 71 A0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 17:08:46.000 UTC",
#       "not  after"         : "2024-01-17 17:08:46.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 B2 5E F7 12 4B 5C 6B   81 C5 F4 10 B9 90 AA 2E  `.^..K\k........
#           0010: EE 6E 58 DB                                        .nX.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F C8 55 BC D3 AE F0 64   F7 8D 2A 88 10 93 7A 1E  ..U....d..*...z.
#           0010: 3D 14 3F 28                                        =.?(
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6A 39 FD BB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 17:08:40.000 UTC",
#       "not  after"         : "2024-01-17 17:08:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BB B0 47 48 3B AC C1 91   EE B1 D1 89 45 21 D5 FC  ..GH;.......E!..
#           0010: C9 58 86 70                                        .X.p
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 B2 5E F7 12 4B 5C 6B   81 C5 F4 10 B9 90 AA 2E  `.^..K\k........
#           0010: EE 6E 58 DB                                        .nX.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.411 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 16 79 43 95 0C 0F 65 71   F4 2E 1D 59 AA 29 DB 1C  .yC...eq...Y.)..
#     0010: C8 10 34 1E E2 7F 45 B4   D4 A2 59 BA 7F DC FE FF  ..4...E...Y.....
#     0020: 8D D0 08 AB 5E 4D BD 18   82 AE 76 98 4B 74 8C BE  ....^M....v.Kt..
#     0030: 87 81 AE D4 18 36 7F B6   57 1D 56 FD ED 3D 2D 09  .....6..W.V..=-.
#     0040: 18 64 2C 9B 35 39 E2 23   41 AF D5 3C B2 3C 19 29  .d,.59.#A..<.<.)
#     0050: 68 A1 34 6D 3D A2 C2 C3   2D 5A F2 74 85 64 A5 CA  h.4m=...-Z.t.d..
#     0060: 9C 91 D9 2B 59 90 2A 42   70 B8 DF 3F E8 2C 5B 05  ...+Y.*Bp..?.,[.
#     0070: F8 EA FB 56 4F CB 14 59   C6 A5 3D A9 FC E2 E6 14  ...VO..Y..=.....
#     0080: 1F 90 FC E7 3E 7A E8 32   2F 12 93 FC 8A 3F 4D B5  ....>z.2/....?M.
#     0090: 3C 91 30 9A 48 B4 9D F4   BE 64 79 1D 2A D7 54 3D  <.0.H....dy.*.T=
#     00A0: 1A B0 88 46 69 EA 7D C9   D2 4E 8D E5 6D E7 6B 5F  ...Fi....N..m.k_
#     00B0: 2F C8 B8 05 04 4D CA 98   69 45 28 AA 08 37 8C 84  /....M..iE(..7..
#     00C0: 9B 99 4A FC DF F5 29 49   B3 50 78 8E 94 55 A5 05  ..J...)I.Px..U..
#     00D0: 1F FB C2 8B EA 44 D9 3D   80 51 BD A7 20 38 5B 4A  .....D.=.Q.. 8[J
#     00E0: 28 8E D6 A1 20 27 6B 67   5D 0B 49 9E 36 53 B0 09  (... 'kg].I.6S..
#     00F0: 26 F7 DA C8 16 59 DD C4   D5 46 77 13 11 2C 18 A7  &....Y...Fw..,..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.413 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F2 61 29 B0 58 45 3C 95   FC 5F D2 C4 00 79 37 2A  .a).XE<.._...y7*
#     0010: FA 0E 24 2F 21 E5 A8 6B   B7 0B BF 1E 1C 98 BE 3E  ..$/!..k.......>
#     0020: 89 14 9A 28 67 73 E3 8B   7B B9 D8 26 8F 2E 04 35  ...(gs.....&...5
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.413 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 17:09:02.491 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 17:09:02.492 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 17:09:02.492 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 17:09:02.492 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 17:09:02.548 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7A 22 1C 2C D3 E8 53 92 23 E6 88 A8 25 92 8A 68 6B 7A D3 9E 37 A2 4A F0 7E AF 79 A0 1A D8 4E 87",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-19 17:09:03.276 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 17:09:03.278 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 17:09:03.278 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 17:09:04.688; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 17:09:04.692; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 17:09:05.011; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-2ql1IX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2ql1IX/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 17:09:05.014; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-2ql1IX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2ql1IX/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 17:09:05.014; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-2ql1IX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2ql1IX/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 17:09:05.050 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 A2 71 A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 17:08:46.000 UTC",
#     "not  after"         : "2024-01-17 17:08:46.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 B2 5E F7 12 4B 5C 6B   81 C5 F4 10 B9 90 AA 2E  `.^..K\k........
#         0010: EE 6E 58 DB                                        .nX.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F C8 55 BC D3 AE F0 64   F7 8D 2A 88 10 93 7A 1E  ..U....d..*...z.
#         0010: 3D 14 3F 28                                        =.?(
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6A 39 FD BB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 17:08:40.000 UTC",
#     "not  after"         : "2024-01-17 17:08:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB B0 47 48 3B AC C1 91   EE B1 D1 89 45 21 D5 FC  ..GH;.......E!..
#         0010: C9 58 86 70                                        .X.p
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 B2 5E F7 12 4B 5C 6B   81 C5 F4 10 B9 90 AA 2E  `.^..K\k........
#         0010: EE 6E 58 DB                                        .nX.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 17:09:05.053 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 E2 A7 F0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 17:08:38.000 UTC",
#     "not  after"         : "2024-01-17 17:08:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BB B0 47 48 3B AC C1 91   EE B1 D1 89 45 21 D5 FC  ..GH;.......E!..
#         0010: C9 58 86 70                                        .X.p
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6A 39 FD BB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 17:08:40.000 UTC",
#     "not  after"         : "2024-01-17 17:08:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB B0 47 48 3B AC C1 91   EE B1 D1 89 45 21 D5 FC  ..GH;.......E!..
#         0010: C9 58 86 70                                        .X.p
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 B2 5E F7 12 4B 5C 6B   81 C5 F4 10 B9 90 AA 2E  `.^..K\k........
#         0010: EE 6E 58 DB                                        .nX.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 17:09:05.064 UTC|S

[...truncated too long message...]

        DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 29 F0 60 CA EB 23 59   D4 F0 08 E6 75 BE 66 8F  .).`..#Y....u.f.
#         0010: 23 02 67 F4                                        #.g.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 17:09:50.248 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 B9 31 52",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 17:09:19.000 UTC",
#     "not  after"         : "2024-01-17 17:09:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 40 5A E1 06 65 08 86   6A C6 FB 9E AC 38 A2 EA  .@Z..e..j....8..
#         0010: D6 05 84 2E                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F F0 23 64",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 17:09:21.000 UTC",
#     "not  after"         : "2024-01-17 17:09:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 40 5A E1 06 65 08 86   6A C6 FB 9E AC 38 A2 EA  .@Z..e..j....8..
#         0010: D6 05 84 2E                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 09 EC 90 BC 26 55 5C B2   38 15 EA 38 F8 AD AC F6  ....&U\.8..8....
#         0010: 23 12 44 64                                        #.Dd
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 17:09:50.258 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14817ms
ok 65 stop command for single port in 16241ms
not ok 66 status detects locally running solr in 2308ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 28715 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 216ms
ok 68 listing out files in 2656ms
ok 69 copying files around in 7074ms
ok 70 upconfig in 3884ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1222ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1199ms
not ok 73 Cleanup in 3340ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 28715 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 18s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/dtttxye66tvm2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 861 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/861/

All tests passed

Build Log:
[...truncated 1165 lines...]
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-19 14:02:14.305; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:02:15.476; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2305ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-19 14:02:17.744; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:02:17.816; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2241ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-19 14:02:20.023; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:02:20.082; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 4497ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-19 14:02:22.308; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:02:24.561; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 23113ms
ok 19 Check export command in 22187ms
ok 20 export fails on non cloud mode in 8949ms
not ok 21 using curl to extract a single pdf file in 10030ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 33993 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33993 (pid=13749). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-19 14:03:27.931; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:03:29.098; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8285ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 33993 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33993 (pid=14244). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-19 14:03:37.389; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:03:37.443; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 9609ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 33993 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33993 (pid=14701). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-19 14:03:45.920; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:03:47.073; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 29644ms
ok 25 start help flag prints help in 163ms
ok 26 stop help flag prints help in 156ms
ok 27 restart help flag prints help in 165ms
ok 28 status help flag prints help in 52ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 157ms
ok 30 create help flag prints help in 166ms
ok 31 createcore help flag prints help in 159ms
ok 32 createcollection help flag prints help in 165ms
ok 33 delete help flag prints help in 164ms
ok 34 version help flag prints help in 53ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 169ms
ok 36 auth help flag prints help in 165ms
ok 37 assert help flag prints help in 905ms
ok 38 post help flag prints help in 886ms
not ok 39 SQL Module in 9670ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:33993/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-19 14:04:30.381; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:04:30.433; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:33993/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 18843ms
not ok 41 icu collation in analysis-extras module in 9384ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-19 14:04:57.522; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:04:58.677; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1356ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 28715 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9617ms
not ok 44 deploying and undeploying a collection level package in 196154ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 33993 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33993 (pid=18785). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 17985ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-19 14:08:35.829; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:08:40.288; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-19 14:08:41.227; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:08:43.480; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 11076ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-19 14:08:54.016; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:08:54.064; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-19 14:08:55.033; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:08:55.082; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3503ms
not ok 48 basic post with a type specified in 1274ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1431ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1144ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1155ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1263ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1216ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1444ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 4294ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-19 14:09:22.375; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:09:22.424; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2263ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-19 14:09:24.665; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:09:24.719; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 11274ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:33993/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-KJVhSI%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-19 14:09:36.036; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:09:36.086; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:33993/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-KJVhSI%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12755ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 33993 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33993 (pid=25039). Happy searching!
#
#     INFO  - 2023-10-19 14:09:43.268; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 14:09:43.273; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 14:09:43.798; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-KJVhSI/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KJVhSI/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 14:09:46.870; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 14:09:46.874; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-19 14:09:48.551; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 14:09:48.556; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12924ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 33993 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33993 (pid=25634). Happy searching!
#
#     INFO  - 2023-10-19 14:09:56.073; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 14:09:56.078; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 14:09:56.663; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KJVhSI/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KJVhSI/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 14:09:56.724; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KJVhSI/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KJVhSI/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 14:09:56.724; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KJVhSI/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KJVhSI/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 14:09:59.692; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 14:09:59.696; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-19 14:10:00.508; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-KJVhSI/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KJVhSI/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-19 14:10:00.510; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-KJVhSI/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KJVhSI/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 14:10:01.553; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 14:10:01.558; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 14:10:01.983; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@21ec5d87[provider=null,keyStore=file:///tmp/bats-run-KJVhSI/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KJVhSI/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 14:10:01.985; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@21ec5d87[provider=null,keyStore=file:///tmp/bats-run-KJVhSI/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KJVhSI/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10443ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 33993 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33993 (pid=26229). Happy searching!
#
#     INFO  - 2023-10-19 14:10:09.105; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 14:10:09.110; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-19 14:10:11.903; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 14:10:11.907; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13674ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-19 14:10:20.398; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 14:10:24.059; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-19 14:10:25.841; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 40634ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-KJVhSI/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 33993 [|]   [/]   [-]   [\]
# Started Solr server on port 33993 (pid=27995). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 33994 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33994 (pid=28116). Happy searching!
#
#     INFO  - 2023-10-19 14:10:50.491; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 14:10:50.498; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 14:10:51.495; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-KJVhSI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KJVhSI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 14:10:51.499; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-KJVhSI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KJVhSI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 14:10:51.501; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-KJVhSI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KJVhSI/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 14:10:51.582 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 A5 ED 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:10:37.000 UTC",
#     "not  after"         : "2024-01-17 14:10:37.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 2A 15 F2 2F 46 6C 07   A3 E1 D9 CB BA ED EF AD  .*../Fl.........
#         0010: 35 AD 42 AB                                        5.B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 79 0F 2C DD A4 6A 54   73 82 D4 A8 86 6D 11 8F  .y.,..jTs....m..
#         0010: C1 5A 88 A6                                        .Z..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 1B 6D F7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:10:31.000 UTC",
#     "not  after"         : "2024-01-17 14:10:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 EE 1B 2D 1E E1 55 86   CE 7F 36 74 1B 3A 3B D3  ...-..U...6t.:;.
#         0010: E7 F6 DD 94                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 2A 15 F2 2F 46 6C 07   A3 E1 D9 CB BA ED EF AD  .*../Fl.........
#         0010: 35 AD 42 AB                                        5.B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 14:10:51.591 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B FD DE 63",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:10:29.000 UTC",
#     "not  after"         : "2024-01-17 14:10:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 EE 1B 2D 1E E1 55 86   CE 7F 36 74 1B 3A 3B D3  ...-..U...6t.:;.
#         0010: E7 F6 DD 94                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 1B 6D F7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:10:31.000 UTC",
#     "not  after"         : "2024-01-17 14:10:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 EE 1B 2D 1E E1 55 86   CE 7F 36 74 1B 3A 3B D3  ...-..U...6t.:;.
#         0010: E7 F6 DD 94                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 2A 15 F2 2F 46 6C 07   A3 E1 D9 CB BA ED EF AD  .*../Fl.........
#         0010: 35 AD 42 AB                                        5.B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 14:10:51.623 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 14:10:52.233 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 14:10:52.233 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 14:10:52.235 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 14:10:52.235 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 14:10:52.239 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 14:10:52.253 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 14:10:52.254 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 14:10:52.254 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 14:10:52.256 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "18 99 11 91 D7 8D 70 43 03 F3 34 3B 34 99 37 96 E6 60 21 99 EF CF 3B 20 B5 0E 2F EA DE 82 C2 DD",
#   "session id"          : "5E F4 CD E0 01 8E 1A C0 77 ED B6 D2 81 5F 29 55 63 D5 4B 80 89 2D 6B 03 03 AC 60 5F 5F 40 94 D7",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 87 0B E4 16 ED 71 6D 6D   EC 8A DA 17 98 CC 1C 9E  .....qmm........
#             0010: DA 5E 1C 83 DB 22 EB 05   54 77 D0 AF 31 1C 4B 3D  .^..."..Tw..1.K=
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.386 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "7E 86 96 64 A1 0F 1B B6 F8 5C A5 74 00 C8 53 FF 1C 98 5A 5C 4F B2 87 86 53 24 B6 A3 8D 31 38 48",
#   "session id"          : "5E F4 CD E0 01 8E 1A C0 77 ED B6 D2 81 5F 29 55 63 D5 4B 80 89 2D 6B 03 03 AC 60 5F 5F 40 94 D7",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 92 2C 9E F4 85 B9 B0 C0   1E 52 2A 8A DE C6 1F D7  .,.......R*.....
#           0010: 8E 55 BF 0C E8 8D 51 D1   0F 2E 83 CD 04 05 5A 2D  .U....Q.......Z-
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.387 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.387 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.388 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.389 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.389 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.389 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.390 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.390 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.390 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.390 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.396 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.400 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.401 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.401 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.401 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.402 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.402 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.403 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.403 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.403 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 14:10:52.403 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 14:10:52.403 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.403 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.403 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.415 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.416 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.417 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.420 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.420 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.420 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.421 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.421 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.421 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.421 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 14:10:52.421 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 14:10:52.421 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.422 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.422 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.422 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.423 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.423 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.424 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 14:10:52.424 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.427 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 8A 8C 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 14:10:33.000 UTC",
#       "not  after"         : "2024-01-17 14:10:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 2A 15 F2 2F 46 6C 07   A3 E1 D9 CB BA ED EF AD  .*../Fl.........
#           0010: 35 AD 42 AB                                        5.B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 BF 9A 27 39 63 CA 01   10 F4 21 80 57 AC F9 3A  %..'9c....!.W..:
#           0010: 55 CC EE 68                                        U..h
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.427 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.504 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 1B 6D F7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:10:31.000 UTC",
#     "not  after"         : "2024-01-17 14:10:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 EE 1B 2D 1E E1 55 86   CE 7F 36 74 1B 3A 3B D3  ...-..U...6t.:;.
#         0010: E7 F6 DD 94                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 2A 15 F2 2F 46 6C 07   A3 E1 D9 CB BA ED EF AD  .*../Fl.........
#         0010: 35 AD 42 AB                                        5.B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.507 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 43 96 B4 9B 8B DF 78 2D   8D 1B 7D E7 0E CA 5A 91  C.....x-......Z.
#     0010: 4C 99 CB 9B CA FB C8 CA   9D 34 20 18 81 13 60 36  L........4 ...`6
#     0020: E7 9D 01 EC 0A 9B CE 7F   FF 72 F5 E5 F5 1E 32 AF  .........r....2.
#     0030: 7B 12 09 B3 FD B9 AF 94   FC 1C 61 75 8B 9B C9 E6  ..........au....
#     0040: C4 3F 90 F6 D5 92 A1 98   DC 6D 0D 87 02 9E 86 AB  .?.......m......
#     0050: 36 7F B2 2F 40 BB 2D 18   9F 08 56 88 4C 7E 45 AB  6../@.-...V.L.E.
#     0060: 2D 46 CF 2C F4 F2 60 BB   75 4B 55 D0 A6 C3 24 5B  -F.,..`.uKU...$[
#     0070: 08 9E 74 CA 2D D0 58 E3   63 E9 BC 63 EC 7D 93 28  ..t.-.X.c..c...(
#     0080: 4B 2C 8A FB D8 48 D4 57   AC 63 F7 77 FF C2 D3 C8  K,...H.W.c.w....
#     0090: C8 26 83 DD F1 E0 E1 63   8E 3C 50 28 D8 24 87 8E  .&.....c.<P(.$..
#     00A0: E5 89 FE 7E 46 6D C8 8E   F9 C2 4E 27 6E 18 21 D3  ....Fm....N'n.!.
#     00B0: 1F C0 4C 4D B7 29 FC D7   37 88 E6 A4 0B 4D 0D 26  ..LM.)..7....M.&
#     00C0: 85 9E C2 AA 64 FB 7C 5C   54 55 B5 FF E6 F3 0A 89  ....d..\TU......
#     00D0: DA 5E 3B 89 62 AA 1A 88   9F 00 ED 0C D9 63 64 68  .^;.b........cdh
#     00E0: 58 DA 61 44 7A 2C FA A5   EE 0A 91 B3 6D 89 78 D1  X.aDz,......m.x.
#     00F0: 98 C7 23 D3 49 B0 92 EA   47 05 F8 03 3A E4 8A D6  ..#.I...G...:...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.508 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 38 4D 2C 7A 28 25 3C D7   58 46 A1 B2 7F D7 1C 57  8M,z(%<.XF.....W
#     0010: B9 31 D2 C1 78 C9 1E 03   F3 9C 56 28 4D C6 2B F3  .1..x.....V(M.+.
#     0020: 19 3D 71 4E ED F3 9D 2D   58 7F D6 2A 02 F4 CA EE  .=qN...-X..*....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.510 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 14:10:52.510 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 14:10:52.511 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 14:10:52.511 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 14:10:52.511 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 14:10:52.511 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 14:10:52.511 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.511 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.513 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "68 A5 ED 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 14:10:37.000 UTC",
#       "not  after"         : "2024-01-17 14:10:37.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 2A 15 F2 2F 46 6C 07   A3 E1 D9 CB BA ED EF AD  .*../Fl.........
#           0010: 35 AD 42 AB                                        5.B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 79 0F 2C DD A4 6A 54   73 82 D4 A8 86 6D 11 8F  .y.,..jTs....m..
#           0010: C1 5A 88 A6                                        .Z..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 1B 6D F7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 14:10:31.000 UTC",
#       "not  after"         : "2024-01-17 14:10:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 EE 1B 2D 1E E1 55 86   CE 7F 36 74 1B 3A 3B D3  ...-..U...6t.:;.
#           0010: E7 F6 DD 94                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 2A 15 F2 2F 46 6C 07   A3 E1 D9 CB BA ED EF AD  .*../Fl.........
#           0010: 35 AD 42 AB                                        5.B.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.538 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 49 BB AE 0C 90 3E 55 AA   79 4E 00 98 6E 58 09 84  I....>U.yN..nX..
#     0010: F0 D2 CC 2B DA 69 86 DA   B1 23 98 F9 9F F8 8E C4  ...+.i...#......
#     0020: 48 0A 17 49 28 D1 A3 FE   97 4B D1 51 A7 51 7E FA  H..I(....K.Q.Q..
#     0030: 9E 53 6E 9F E8 CF A5 17   6E E3 6F 52 13 38 9C 03  .Sn.....n.oR.8..
#     0040: 92 A4 D5 BB EC 7D 16 31   BC 72 67 06 A7 E7 89 B5  .......1.rg.....
#     0050: 79 F4 62 EC B5 7F 16 9F   CD 06 D4 BE 43 9F C3 E5  y.b.........C...
#     0060: C6 05 A5 28 11 90 E0 0C   49 7C C2 7D 25 4B 0F 4F  ...(....I...%K.O
#     0070: 1F A4 FD F8 60 4A EB CF   F0 3A 48 5B B4 4C 88 89  ....`J...:H[.L..
#     0080: A9 3E 35 71 04 A6 21 D4   08 79 08 9D 9C 1A D4 62  .>5q..!..y.....b
#     0090: 98 26 68 4D 01 E9 BC E3   72 A6 0C 86 7F 6A 30 23  .&hM....r....j0#
#     00A0: 9D CA CA 53 11 22 3C B1   0F E2 60 8D A8 7E 85 E4  ...S."<...`.....
#     00B0: 1D 9E BA 11 D1 91 92 F8   84 34 F0 B5 0A 24 62 C6  .........4...$b.
#     00C0: 14 6C F3 12 34 3A 36 F5   F5 1C E2 B1 05 9A A6 85  .l..4:6.........
#     00D0: 8F 84 66 34 1D A7 61 47   35 BB CA A0 89 48 83 BC  ..f4..aG5....H..
#     00E0: 28 38 E1 0F B9 5B AD FA   AC C2 3D 56 88 94 93 63  (8...[....=V...c
#     00F0: 3D B5 FD DE 9C 4E 14 C6   B4 2C 2C BE 26 32 D3 00  =....N...,,.&2..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.540 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DD 4A F1 B3 E9 B8 07 A6   51 0A 79 F3 4D E0 8D 78  .J......Q.y.M..x
#     0010: BE AA 86 3A 95 22 B8 50   4F 73 20 D6 B1 F0 63 A6  ...:.".POs ...c.
#     0020: 2D 9E 7C 74 34 8B 2D 00   B5 43 AF 0B 4A 3F 39 1F  -..t4.-..C..J?9.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.541 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:10:52.874 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:10:52.874 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:10:52.874 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:10:52.874 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 14:10:52.882 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "53 BC A1 52 9E 71 67 2D 50 EE 8E A4 B4 94 4E CD D6 32 63 0F 5F C1 40 10 41 0E 16 8E 83 BA 43 87",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 14:10:53.097 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 14:10:53.098 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 14:10:53.942; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 14:10:53.945; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 14:10:54.468; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-KJVhSI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KJVhSI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 14:10:54.470; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-KJVhSI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:/

[...truncated too long message...]

      PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 2A 15 F2 2F 46 6C 07   A3 E1 D9 CB BA ED EF AD  .*../Fl.........
#         0010: 35 AD 42 AB                                        5.B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 14:11:04.031 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B FD DE 63",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:10:29.000 UTC",
#     "not  after"         : "2024-01-17 14:10:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 EE 1B 2D 1E E1 55 86   CE 7F 36 74 1B 3A 3B D3  ...-..U...6t.:;.
#         0010: E7 F6 DD 94                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 1B 6D F7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:10:31.000 UTC",
#     "not  after"         : "2024-01-17 14:10:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 EE 1B 2D 1E E1 55 86   CE 7F 36 74 1B 3A 3B D3  ...-..U...6t.:;.
#         0010: E7 F6 DD 94                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 2A 15 F2 2F 46 6C 07   A3 E1 D9 CB BA ED EF AD  .*../Fl.........
#         0010: 35 AD 42 AB                                        5.B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 14:11:04.041 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 63 start solr with mTLS wanted in 49027ms
ok 64 SOLR-11740 check 'solr stop' connection in 14418ms
ok 65 stop command for single port in 17031ms
not ok 66 status detects locally running solr in 2398ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 28715 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 218ms
ok 68 listing out files in 2769ms
ok 69 copying files around in 9399ms
ok 70 upconfig in 3825ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1208ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1205ms
not ok 73 Cleanup in 3404ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 28715 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 3m 9s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/mzdwnvvr2bli6

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 860 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/860/

All tests passed

Build Log:
[...truncated 1297 lines...]
# ERROR: Error from server at http://localhost:36343/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=javabin&version=2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 46 Random placement plugin using ENV in 15886ms
ok 47 Check help command in 4165ms
ok 48 basic post with a type specified in 5455ms
ok 49 basic post WITHOUT a type specified in 12089ms
ok 50 crawling a directory in 4937ms
ok 51 crawling a web site in 5129ms
ok 52 commit and optimize and delete in 4081ms
ok 53 args mode in 6938ms
ok 54 stdin mode in 3539ms
ok 55 post solr log into solr via script in 10679ms
ok 56 post solr log into solr via cli in 7469ms
ok 57 allowPaths - backup in 17497ms
ok 58 start solr with ssl in 19795ms
not ok 59 use different hostname when not checking peer-name in 21583ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 36343 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36343 (pid=487863). Happy searching!
#
#     INFO  - 2023-10-19 11:54:38.289; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 11:54:38.293; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 11:54:38.634; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-bA5XPk/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-bA5XPk/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 11:54:38.699; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-bA5XPk/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-bA5XPk/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 11:54:38.700; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-bA5XPk/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-bA5XPk/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 11:54:49.248; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 11:54:49.253; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 11:54:49.650; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@6175619b[provider=null,keyStore=file:///tmp/bats-run-bA5XPk/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-bA5XPk/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:36343/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 11:54:51.203; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 11:54:51.210; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 11:54:52.080; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 11:54:52.294; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 17721ms
ok 61 start solr with client truststore and security manager in 20352ms
not ok 62 start solr with mTLS needed in 54773ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-bA5XPk/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 36343 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36343 (pid=490579). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 36344 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 36344 (pid=490752). Happy searching!
#
#     INFO  - 2023-10-19 11:55:56.218; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 11:55:56.228; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 11:55:57.192; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-bA5XPk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bA5XPk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 11:55:57.194; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-bA5XPk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bA5XPk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 11:55:57.195; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(ca,h=[localhost],a=[],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-bA5XPk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bA5XPk/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 11:55:57.245 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 62 EF CA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 11:55:42.000 UTC",
#     "not  after"         : "2024-01-17 11:55:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#         0010: C5 C4 94 40                                        ...@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AD DD 12 B2 82 BD 8F 48   EF CB 38 4D 0F A5 12 86  .......H..8M....
#         0010: 8D 5A DF 7B                                        .Z..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 15 A4 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 11:55:35.000 UTC",
#     "not  after"         : "2024-01-17 11:55:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 00 30 AF 0E 57 2B DB 8D   69 2D 8C 69 32 98 6B 7C  .0..W+..i-.i2.k.
#         0010: DF 64 79 E1                                        .dy.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#         0010: C5 C4 94 40                                        ...@
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 11:55:57.256 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 15 A4 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 11:55:35.000 UTC",
#     "not  after"         : "2024-01-17 11:55:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 00 30 AF 0E 57 2B DB 8D   69 2D 8C 69 32 98 6B 7C  .0..W+..i-.i2.k.
#         0010: DF 64 79 E1                                        .dy.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#         0010: C5 C4 94 40                                        ...@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 A0 97 54",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 11:55:33.000 UTC",
#     "not  after"         : "2024-01-17 11:55:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 00 30 AF 0E 57 2B DB 8D   69 2D 8C 69 32 98 6B 7C  .0..W+..i-.i2.k.
#         0010: DF 64 79 E1                                        .dy.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 11:55:57.292 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 11:55:57.902 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:55:57.902 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 11:55:57.904 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 11:55:57.905 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:55:57.919 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:55:57.954 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:55:57.954 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:55:57.955 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:55:57.966 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6D C5 FE 33 AC 2E C6 C0 74 A7 18 4F 6E CD 6F 69 CD E0 C7 0C A7 A7 51 31 F3 4A 73 F3 B7 4F 82 4E",
#   "session id"          : "4E 94 87 BC CC EF 9D AF 12 E8 4E 0A 89 EE 53 7D F9 42 34 CF AE 82 06 97 82 A3 6A 4A DE 6C EC 2A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B4 AA 25 7A 01 B3 DA 72   C9 E0 4C 04 B3 E3 0E 0D  ..%z...r..L.....
#             0010: 91 C4 5D 4F 33 C7 8C 5F   2A 5D D1 08 A9 57 42 10  ..]O3.._*]...WB.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.137 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C3 72 74 83 94 37 29 6B 78 E3 1B A6 90 D6 DD 1F 47 45 7F E4 11 62 6A 88 0F 42 B7 25 5C EB 58 D2",
#   "session id"          : "4E 94 87 BC CC EF 9D AF 12 E8 4E 0A 89 EE 53 7D F9 42 34 CF AE 82 06 97 82 A3 6A 4A DE 6C EC 2A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F8 F9 F2 87 10 53 81 67   62 D1 01 99 88 B6 54 B4  .....S.gb.....T.
#           0010: 79 4A BD EF 12 36 25 69   57 40 75 99 2C 4A B1 4A  yJ...6%iW@u.,J.J
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.142 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.143 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.144 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.150 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.152 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.158 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.158 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.160 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.160 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.160 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.160 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:55:58.160 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:55:58.161 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.161 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.161 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.188 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.193 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.196 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.200 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.201 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.202 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.204 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.205 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.205 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.206 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:55:58.206 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:55:58.206 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.208 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.208 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.209 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.210 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.210 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.211 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:55:58.211 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.213 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 22 BF 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 11:55:38.000 UTC",
#       "not  after"         : "2024-01-17 11:55:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#           0010: C5 C4 94 40                                        ...@
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 22 50 90 36 9A EE 69   65 14 48 CC FA 31 E1 D0  ."P.6..ie.H..1..
#           0010: 2C 2D 4E E9                                        ,-N.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.214 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.829 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 15 A4 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 11:55:35.000 UTC",
#     "not  after"         : "2024-01-17 11:55:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 00 30 AF 0E 57 2B DB 8D   69 2D 8C 69 32 98 6B 7C  .0..W+..i-.i2.k.
#         0010: DF 64 79 E1                                        .dy.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#         0010: C5 C4 94 40                                        ...@
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.838 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 09 6C B3 32 EF A5 62 9B   AA AD A0 0A C2 05 92 B0  .l.2..b.........
#     0010: 6F 2A F6 74 72 B8 07 8C   1A 77 66 1D B9 91 1F 4E  o*.tr....wf....N
#     0020: 3E B1 93 C6 11 B8 8E 17   4C 4C FF C9 F8 DF 0B 0E  >.......LL......
#     0030: 06 EC A0 D8 38 63 70 3B   8C CF 16 75 93 9B 09 E3  ....8cp;...u....
#     0040: 73 7C C8 EC 65 61 77 24   AA CE F1 B1 D5 FE 61 45  s...eaw$......aE
#     0050: 7E D3 FE 52 C7 7A 72 F0   EA 24 B0 57 D8 8F 5B AF  ...R.zr..$.W..[.
#     0060: 83 1A 03 44 0D C9 15 60   BD 2C C9 A1 3B 00 DC 4B  ...D...`.,..;..K
#     0070: C0 E8 2A 7A 34 BE B7 6B   46 90 95 52 56 8A D1 B1  ..*z4..kF..RV...
#     0080: CC BF 72 9B 31 0B 44 58   AA 94 7E 1F A9 0C D5 5F  ..r.1.DX......._
#     0090: 4E 6B 4D A9 B9 FB 07 39   39 E7 AD DD 63 D7 9F B2  NkM....99...c...
#     00A0: A8 21 35 3B 22 D7 C1 8E   76 E6 70 AA FD 33 E9 44  .!5;"...v.p..3.D
#     00B0: 07 8C C2 EB 3D 4C E5 04   D2 12 96 27 06 A2 8E 71  ....=L.....'...q
#     00C0: DA F7 FB F2 6F 3F F0 5D   BB 63 AF F8 A2 DA 29 14  ....o?.].c....).
#     00D0: A8 78 FB 8B 1B 9F 8E C5   58 02 81 59 78 1F E7 D8  .x......X..Yx...
#     00E0: 50 CE A0 66 15 87 4C 50   44 88 85 CE C4 E5 7C 55  P..f..LPD......U
#     00F0: 04 07 61 9F 6F BB A3 14   36 91 0F 24 BF B7 83 88  ..a.o...6..$....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.840 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 30 2A 43 A5 90 35 C0 C4   E2 1B 27 EB 00 03 6D 05  0*C..5....'...m.
#     0010: B7 65 F6 63 8D 5E 36 36   3C C0 2C 27 DE FF 29 17  .e.c.^66<.,'..).
#     0020: A3 D2 9E 9B EE 85 49 DF   49 2F 54 44 5E C0 BF AB  ......I.I/TD^...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.847 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 11:55:58.848 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:55:58.848 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 11:55:58.849 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:55:58.849 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 11:55:58.861 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 11:55:58.862 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 11:55:58.862 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 11:55:58.862 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 11:55:58.862 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:55:58.861 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.863 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.865 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "42 62 EF CA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 11:55:42.000 UTC",
#       "not  after"         : "2024-01-17 11:55:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#           0010: C5 C4 94 40                                        ...@
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AD DD 12 B2 82 BD 8F 48   EF CB 38 4D 0F A5 12 86  .......H..8M....
#           0010: 8D 5A DF 7B                                        .Z..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F 15 A4 6C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 11:55:35.000 UTC",
#       "not  after"         : "2024-01-17 11:55:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 00 30 AF 0E 57 2B DB 8D   69 2D 8C 69 32 98 6B 7C  .0..W+..i-.i2.k.
#           0010: DF 64 79 E1                                        .dy.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#           0010: C5 C4 94 40                                        ...@
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.909 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 41 85 A4 4C 84 FF F0 27   2E 44 69 39 5E 2A 03 DE  A..L...'.Di9^*..
#     0010: 75 21 1B 85 94 57 EB AE   B4 38 E3 99 85 42 2F 8D  u!...W...8...B/.
#     0020: D0 AD 96 2C 41 0B 1B 1B   EF 4D 7C 14 F4 FB 7C A0  ...,A....M......
#     0030: 6E 24 3C 88 A2 D0 4B 3B   D5 F1 9D CF FD 1A B3 BD  n$<...K;........
#     0040: DD 86 65 C3 33 E0 31 08   44 30 DC 01 34 C5 55 48  ..e.3.1.D0..4.UH
#     0050: DC C7 B3 9C 71 23 7B 49   E5 75 84 51 99 F1 EF 3D  ....q#.I.u.Q...=
#     0060: 5F 79 65 CF 3A 87 F7 52   94 C0 E1 DD F2 E7 C0 15  _ye.:..R........
#     0070: 11 06 EF 48 6C AB 6F 71   22 52 3C AE B5 92 FB 57  ...Hl.oq"R<....W
#     0080: B0 8A 62 D4 11 81 85 4E   A8 C5 60 59 E0 86 0C E5  ..b....N..`Y....
#     0090: EC 18 34 5B 30 6E 5B 99   D1 8E 52 6A 45 4C 72 59  ..4[0n[...RjELrY
#     00A0: 29 75 E0 45 4F E2 94 F3   0A B1 C3 FD F4 F6 5F 2B  )u.EO........._+
#     00B0: 8E 5C 4E 73 AD F6 13 EF   01 77 0C CD FC C1 D6 87  .\Ns.....w......
#     00C0: BC F2 13 2A FB BF 66 08   98 BA 93 A4 99 CF 2E 45  ...*..f........E
#     00D0: 4F FC 3A 55 BA E8 C0 02   23 84 32 49 F4 82 AC C3  O.:U....#.2I....
#     00E0: 64 2D 1B 2D 4F D5 AC 7F   9C 6C 8B A5 C9 99 BA 88  d-.-O....l......
#     00F0: 07 22 25 14 02 01 E2 76   6F B3 76 F5 AE E9 A5 2D  ."%....vo.v....-
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.911 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 05 59 FD D7 35 80 0F 24   AB AC 49 B3 15 17 D9 3C  .Y..5..$..I....<
#     0010: 75 B8 72 E9 6A 03 86 0E   05 98 E6 3D 5B CC 7B 29  u.r.j......=[..)
#     0020: D9 DA DB A0 25 F2 31 FB   1D 5D D6 59 51 A9 B0 1F  ....%.1..].YQ...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:55:58.915 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-19 11:55:58.987 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "93 38 FA 4E 12 52 36 5F 7B C0 47 B2 B6 7F C9 64 DA 6B 27 0E E8 E4 8D 4E AA 47 19 9E 6A 28 00 87",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 11:55:59.345 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 11:55:59.346 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 11:56:01.001; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 11:56:01.006; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 11:56:01.455; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-bA5XPk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bA5XPk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 11:56:01.458; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-bA5XPk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bA5XPk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 11:56:01.459; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5b970f7(ca,h=[localhost],a=[],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-bA5XPk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bA5XPk/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 11:56:01.498 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 62 EF CA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 11:55:42.000 UTC",
#     "not  after"         : "2024-01-17 11:55:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#         0010: C5 C4 94 40                                        ...@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AD DD 12 B2 82 BD 8F 48   EF CB 38 4D 0F A5 12 86  .......H..8M....
#         0010: 8D 5A DF 7B                                        .Z..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 15 A4 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 11:55:35.000 UTC",
#     "not  after"         : "2024-01-17 11:55:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 00 30 AF 0E 57 2B DB 8D   69 2D 8C 69 32 98 6B 7C  .0..W+..i-.i2.k.
#         0010: DF 64 79 E1                                        .dy.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#         0010: C5 C4 94 40                                        ...@
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 11:56:01.502 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 15 A4 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 11:55:35.000 UTC",
#     "not  after"         : "2024-01-17 11:55:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 00 30 AF 0E 57 2B DB 8D   69 2D 8C 69 32 98 6B 7C  .0..W+..i-.i2.k.
#         0010: DF 64 79 E1                                        .dy.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#         0010: C5 C4 94 40                                        ...@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 A0 97 54",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 11:55:33.000 UTC",
#     "not  after"         : "2024-01-17 11:55:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 00 30 AF 0E 57 2B DB 8D   69 2D 8C 69 32 98 6B 7C  .0..W+..i-.i2.k.
#         0010: DF 64 79 E1                                        .dy.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 11:56:01.515 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 11:56:01.693 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:56:01.693 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 11:56:01.695 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 11:56:01.695 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:56:01.704 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:56:01.716 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:56:01.716 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:56:01.716 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:56:01.719 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F2 E7 F5 96 CC 9F 92 B0 D9 6D 94 B9 F8 78 7B EE 0F 03 1A CF AE 57 09 4A 03 8A 39 D2 85 9F B8 FC",
#   "session id"          : "EC 36 9E 40 BE 0E CF EC 66 F1 74 AC FA D4 5D 54 7E F5 43 94 EA AC 5E 2B 23 59 6D 79 55 D8 F0 A8",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B7 B2 6D E9 38 DE 21 10   C7 26 FC EF 0B 0F CC C6  ..m.8.!..&......
#             0010: AF 40 40 E1 43 0C C6 AE   28 1F 94 F1 F3 31 B0 07  .@@.C...(....1..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.834 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "3D BB EE 1A 34 22 61 AD FA B2 05 3D 12 B4 B8 69 8D 4A 3C 6D D9 D9 5E E4 4D 72 A4 25 32 50 BE 69",
#   "session id"          : "EC 36 9E 40 BE 0E CF EC 66 F1 74 AC FA D4 5D 54 7E F5 43 94 EA AC 5E 2B 23 59 6D 79 55 D8 F0 A8",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 9E 6B BF 1C 96 CD F7 FD   86 7A D3 42 D2 3A BC 9E  .k.......z.B.:..
#           0010: 6E 89 3B 22 C0 F4 F2 D6   17 BF 0C E8 3D C6 E2 6F  n.;"........=..o
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.834 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.834 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.835 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.836 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.836 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.836 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.836 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.836 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.836 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.836 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.838 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.838 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.838 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:56:01.839 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:56:01.839 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.840 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.840 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.870 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.872 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.873 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.876 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.876 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.877 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.877 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.877 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.877 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.877 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:56:01.877 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:56:01.877 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.878 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.878 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.879 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.883 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.884 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.891 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:56:01.891 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.894 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 22 BF 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 11:55:38.000 UTC",
#       "not  after"         : "2024-01-17 11:55:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#           0010: C5 C4 94 40                                        ...@
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 22 50 90 36 9A EE 69   65 14 48 CC FA 31 E1 D0  ."P.6..ie.H..1..
#           0010: 2C 2D 4E E9                                        ,-N.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.900 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:01.988 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 15 A4 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 11:55:35.000 UTC",
#     "not  after"         : "2024-01-17 11:55:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 00 30 AF 0E 57 2B DB 8D   69 2D 8C 69 32 98 6B 7C  .0..W+..i-.i2.k.
#         0010: DF 64 79 E1                                        .dy.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#         0010: C5 C4 94 40                                        ...@
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:02.118 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 86 0F 98 A2 63 53 54 FD   BB 0A A9 43 17 80 BA D7  ....cST....C....
#     0010: B0 C1 9F D8 FD E6 27 4C   BA 82 06 E8 B6 85 B1 9E  ......'L........
#     0020: B2 32 6E 2F 2B F5 7D DD   15 DB 23 B4 B4 C6 0E 9F  .2n/+.....#.....
#     0030: B8 77 7C B3 ED 61 51 A5   F6 9F 1F 0B FD 50 92 9A  .w...aQ......P..
#     0040: 84 61 70 4E A5 C5 ED 29   5C D8 1E C0 83 F4 F8 37  .apN...)\......7
#     0050: 69 D3 58 D0 0C 78 67 1C   8F AA 1A 7A 50 37 80 6A  i.X..xg....zP7.j
#     0060: C3 A0 8F E4 35 F0 DC FF   2D C1 D2 D5 FE ED 73 A7  ....5...-.....s.
#     0070: 5F 10 4B BC 5A 18 DC 25   91 07 48 12 65 6C 6B D6  _.K.Z..%..H.elk.
#     0080: 39 3C AD 27 AB 89 11 AA   97 85 C7 00 0B C8 0E 09  9<.'............
#     0090: 7C A4 CB 59 D1 39 54 9E   E5 AA F3 FF CF 4D C8 2E  ...Y.9T......M..
#     00A0: 6F 14 0D 34 B0 64 09 CC   4A B3 E5 FE B7 58 0A FC  o..4.d..J....X..
#     00B0: 32 12 28 F9 C5 6E 41 70   61 43 3A 20 F4 63 83 2F  2.(..nApaC: .c./
#     00C0: 35 8F 9C 4C C5 8B 10 C8   35 F1 74 7C BA FA D0 D8  5..L....5.t.....
#     00D0: E6 79 24 BF 2A 1E B2 87   68 64 62 A5 2E E0 69 2C  .y$.*...hdb...i,
#     00E0: 49 D6 56 28 49 D2 4A 27   5F AD E6 52 04 BD A9 CD  I.V(I.J'_..R....
#     00F0: F3 F4 AD 4D 39 E5 1E F2   B9 4E 19 C2 FF 83 0D 77  ...M9....N.....w
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:02.120 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 81 F1 4B E3 BC DE A3 17   4B 10 49 A0 8B B5 2D 00  ..K.....K.I...-.
#     0010: 58 D1 D3 14 F2 E6 6F 65   E3 C3 F8 59 32 BB 05 F3  X.....oe...Y2...
#     0020: C8 6A 5C 93 34 C9 5B 20   1C 7D 21 69 7D C3 29 26  .j\.4.[ ..!i..)&
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:02.123 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 11:56:02.124 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:56:02.124 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 11:56:02.124 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:56:02.124 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 11:56:02.125 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:56:02.125 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:02.125 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:02.128 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "42 62 EF CA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 11:55:42.000 UTC",
#       "not  after"         : "2024-01-17 11:55:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#           0010: C5 C4 94 40                                        ...@
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AD DD 12 B2 82 BD 8F 48   EF CB 38 4D 0F A5 12 86  .......H..8M....
#           0010: 8D 5A DF 7B                                        .Z..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F 15 A4 6C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 11:55:35.000 UTC",
#       "not  after"         : "2024-01-17 11:55:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 00 30 AF 0E 57 2B DB 8D   69 2D 8C 69 32 98 6B 7C  .0..W+..i-.i2.k.
#           0010: DF 64 79 E1                                        .dy.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#           0010: C5 C4 94 40                                        ...@
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:02.167 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 82 7B E6 94 07 14 D2 27   10 C3 4B 86 33 80 F2 F7  .......'..K.3...
#     0010: C0 C6 1F 02 69 0B F6 79   19 12 BA 80 B2 DA 58 CE  ....i..y......X.
#     0020: B1 EA E9 11 AD 89 CE 3C   BA CA F1 26 FE 03 D1 D2  .......<...&....
#     0030: 69 A5 25 24 37 80 6A 90   85 8C CE 14 56 91 F6 16  i.%$7.j.....V...
#     0040: 01 67 21 7C 41 40 40 27   4E C8 87 5E 51 6F 78 3E  .g!.A@@'N..^Qox>
#     0050: B9 29 85 C7 68 61 F7 3A   11 19 14 F4 C2 04 C6 C3  .)..ha.:........
#     0060: C2 53 EE 0C 98 87 DB 42   AD FB 54 3E E7 AB 5B DB  .S.....B..T>..[.
#     0070: 0E 74 54 9D B1 2D 1D D4   E7 FC B0 F2 A2 1C 87 24  .tT..-.........$
#     0080: 42 13 69 FD 45 BA AC 95   9B A0 55 82 A1 67 9C 84  B.i.E.....U..g..
#     0090: E0 EC C4 5E B9 44 3B E8   CD 6A 66 50 9F 55 01 81  ...^.D;..jfP.U..
#     00A0: B0 B1 E6 AB AC 8D 1E 65   1E F6 F6 59 FF 13 13 3D  .......e...Y...=
#     00B0: 09 5E 13 69 EE 95 D0 68   32 8D 1B D3 4F E9 41 0C  .^.i...h2...O.A.
#     00C0: 50 C3 1B 42 64 19 7D 0B   01 6D BE B5 7F 04 02 24  P..Bd....m.....$
#     00D0: CA D4 4E 22 DA 19 87 83   1F 19 E7 C4 83 BD 22 AF  ..N"..........".
#     00E0: 46 EE 35 72 D9 E6 93 B8   62 4F F8 A1 F8 38 BE D3  F.5r....bO...8..
#     00F0: DB 6A DF 55 88 3D 48 8B   E9 54 6C 71 79 B0 FC 5F  .j.U.=H..Tlqy.._
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:02.169 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CD 3F 20 04 B2 FD 4D E4   4B AE 17 FD 5E 46 4A 07  .? ...M.K...^FJ.
#     0010: ED EC B1 88 B2 AB 69 8C   6F CD 76 EF E0 4E 41 79  ......i.o.v..NAy
#     0020: C8 E7 23 1A 3C EE 0E B7   B5 C0 5E 72 71 A9 36 20  ..#.<.....^rq.6
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:02.170 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 11:56:02.216 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 11:56:02.217 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 11:56:02.217 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 11:56:02.217 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:02.235 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1A 1E 84 E8 FB 2E 94 21 D7 AE A4 EB 8C 2D F5 38 29 3B 00 71 F3 8F 70 13 4F 0C D4 93 B3 E8 6A 78",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 11:56:02.661 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 11:56:02.662 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-19 11:56:16.213; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 11:56:16.564 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F 15 A4 6C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 11:55:35.000 UTC",
#       "not  after"         : "2024-01-17 11:55:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 00 30 AF 0E 57 2B DB 8D   69 2D 8C 69 32 98 6B 7C  .0..W+..i-.i2.k.
#           0010: DF 64 79 E1                                        .dy.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A C1 32 E6 26 CF 28 93   3C 09 E8 C7 18 63 82 4E  :.2.&.(.<....c.N
#           0010: C5 C4 94 40                                        ...@
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 A0 97 54",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 11:55:33.000 UTC",
#       "not  after"         : "2024-01-17 11:55:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 00 30 AF 0E 57 2B DB 8D   69 2D 8C 69 32 98 6B 7C  .0..W+..i-.i2.k.
#           0010: DF 64 79 E1                                        .dy.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 11:56:16.578 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 11:56:16.756 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:56:16.756 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 11:56:16.758 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 11:56:16.758 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:56:16.763 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:56:16.775 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:56:16.775 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:56:16.775 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 11:56:16.778 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "01 AD BB 75 2A 50 98 EF 9E 38 0F C0 00 B4 6E 49 37 17 2D 9C 5B 49 04 02 5D 71 70 4E 33 7A 77 19",
#     "session id"          : "5C BE 7C E2 DA 59 41 BA E1 7F AA 0F 05 39 C4 8C 67 FD 34 0A 91 3B 06 46 77 FF CB 62 7C 3E 27 8E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: CF 80 CD 6D E8 F5 8C 26   12 99 7F 16 5F C4 38 AF  ...m...&...._.8.
#               0010: 55 89 9B EA AA 5A F2 13   A3 7C 0D B3 0C 97 A2 67  U....Z.........g
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.795 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "06 E1 4D C0 D3 59 1A 94 FB 48 48 A0 4D 7C 3E DC 85 69 5A AB FB 9E A5 B1 8F 99 B3 E5 3B C5 10 02",
#     "session id"          : "5C BE 7C E2 DA 59 41 BA E1 7F AA 0F 05 39 C4 8C 67 FD 34 0A 91 3B 06 46 77 FF CB 62 7C 3E 27 8E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: BE 30 27 71 1B 35 F7 1E   F9 EA 1C 57 BC 90 A3 98  .0'q.5.....W....
#             0010: 60 5C 57 B3 C6 10 2D 40   D3 6A 06 8D DA B1 87 75  `\W...-@.j.....u
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.796 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.796 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.797 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.799 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.799 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.799 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.799 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.799 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.799 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.799 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.799 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.800 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.800 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:56:16.800 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:56:16.800 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.800 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.800 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.806 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.807 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.808 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.812 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 11:56:16.812 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl

[...truncated too long message...]

path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 11:57:32.222 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:36344/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14702ms
ok 65 stop command for single port in 18270ms
not ok 66 status detects locally running solr in 1578ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 256ms
ok 68 listing out files in 3166ms
ok 69 copying files around in 6590ms
ok 70 upconfig in 2629ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1243ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1254ms
not ok 73 Cleanup in 2530ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 3m 9s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/olzcyfarbr37c

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 859 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/859/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 195717ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 6 create collection in 7645ms
ok 7 reject d option with invalid config dir in 4419ms
ok 8 accept d option with builtin config in 5704ms
ok 9 accept d option with explicit path to config in 6803ms
ok 10 accept n option as config name in 6447ms
ok 11 allow config reuse when n option specifies same config in 9030ms
ok 12 create multisharded collections when s provided in 5254ms
ok 13 create replicated collections when rf provided in 6191ms
ok 14 can delete collections in 16129ms
ok 15 collection delete also deletes zk config in 10443ms
ok 16 deletes accompanying zk config with nondefault name in 9454ms
ok 17 deleteConfig option can opt to leave config in zk in 10575ms
ok 18 SOLR-16755 test works with noprompt in 23269ms
ok 19 Check export command in 21385ms
ok 20 export fails on non cloud mode in 8545ms
not ok 21 using curl to extract a single pdf file in 8775ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 40059 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40059 (pid=11369). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-19 09:31:07.677; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 09:31:07.721; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8372ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 40059 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40059 (pid=11846). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-19 09:31:16.021; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 09:31:16.075; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8713ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 40059 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40059 (pid=12269). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-19 09:31:24.811; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 09:31:24.859; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30334ms
ok 25 start help flag prints help in 151ms
ok 26 stop help flag prints help in 147ms
ok 27 restart help flag prints help in 151ms
ok 28 status help flag prints help in 48ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 148ms
ok 30 create help flag prints help in 144ms
ok 31 createcore help flag prints help in 147ms
ok 32 createcollection help flag prints help in 148ms
ok 33 delete help flag prints help in 153ms
ok 34 version help flag prints help in 48ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 151ms
ok 36 auth help flag prints help in 154ms
ok 37 assert help flag prints help in 867ms
ok 38 post help flag prints help in 888ms
not ok 39 SQL Module in 13350ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:40059/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-19 09:32:08.451; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 09:32:11.816; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:40059/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 24285ms
not ok 41 icu collation in analysis-extras module in 10182ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-19 09:32:44.532; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 09:32:46.780; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1167ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 28715 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9399ms
not ok 44 deploying and undeploying a collection level package in 195722ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 40059 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40059 (pid=16430). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 16128ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-19 09:36:22.924; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 09:36:24.077; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-19 09:36:24.989; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 09:36:29.440; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 11689ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-19 09:36:39.018; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 09:36:40.173; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-19 09:36:41.096; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 09:36:41.143; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3224ms
not ok 48 basic post with a type specified in 1276ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1074ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1295ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1463ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1205ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1219ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1189ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 4003ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-19 09:37:07.608; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 09:37:07.659; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2219ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-19 09:37:09.853; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 09:37:09.904; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 16739ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:40059/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-YRHAd6%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-19 09:37:20.618; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 09:37:26.183; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:40059/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-YRHAd6%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 11800ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 40059 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40059 (pid=22826). Happy searching!
#
#     INFO  - 2023-10-19 09:37:33.919; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 09:37:33.922; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 09:37:34.353; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-YRHAd6/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-YRHAd6/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 09:37:36.924; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 09:37:36.927; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-19 09:37:38.328; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 09:37:38.332; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12296ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 40059 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40059 (pid=23423). Happy searching!
#
#     INFO  - 2023-10-19 09:37:45.489; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 09:37:45.494; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 09:37:46.029; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-YRHAd6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-YRHAd6/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 09:37:46.118; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-YRHAd6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-YRHAd6/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 09:37:46.118; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-YRHAd6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-YRHAd6/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 09:37:48.826; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 09:37:48.830; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-19 09:37:49.463; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@53499d85[provider=null,keyStore=file:///tmp/bats-run-YRHAd6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-YRHAd6/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-19 09:37:49.464; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@53499d85[provider=null,keyStore=file:///tmp/bats-run-YRHAd6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-YRHAd6/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 09:37:50.473; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 09:37:50.477; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 09:37:50.852; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-YRHAd6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-YRHAd6/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 09:37:50.853; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-YRHAd6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-YRHAd6/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10827ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 40059 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40059 (pid=23974). Happy searching!
#
#     INFO  - 2023-10-19 09:37:57.978; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 09:37:57.982; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-19 09:38:01.136; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 09:38:01.141; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13833ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-19 09:38:09.750; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 09:38:13.898; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-19 09:38:15.259; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 39318ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-YRHAd6/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40059 [|]   [/]   [-]   [\]
# Started Solr server on port 40059 (pid=25601). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40060 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 40060 (pid=25725). Happy searching!
#
#     INFO  - 2023-10-19 09:38:39.721; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 09:38:39.724; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 09:38:40.028; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-YRHAd6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YRHAd6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 09:38:40.030; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-YRHAd6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YRHAd6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 09:38:40.030; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-YRHAd6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YRHAd6/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 09:38:40.441 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "56 01 46 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 09:38:27.000 UTC",
#     "not  after"         : "2024-01-17 09:38:27.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 74 87 C7 62 BE 12 19 6E   A5 0E 52 B6 E8 A3 85 5B  t..b...n..R....[
#         0010: C8 6C 6E 11                                        .ln.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4A D4 6E 04 B2 56 68 6F   79 AE 8E A7 14 81 AB 17  J.n..Vhoy.......
#         0010: CE B3 A8 89                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "51 4F 24 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 09:38:20.000 UTC",
#     "not  after"         : "2024-01-17 09:38:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FC 88 E4 E5 3B DC C9 9A   55 85 17 00 46 C5 32 1B  ....;...U...F.2.
#         0010: 35 9B DA 8D                                        5...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 74 87 C7 62 BE 12 19 6E   A5 0E 52 B6 E8 A3 85 5B  t..b...n..R....[
#         0010: C8 6C 6E 11                                        .ln.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 09:38:40.445 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "51 4F 24 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 09:38:20.000 UTC",
#     "not  after"         : "2024-01-17 09:38:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FC 88 E4 E5 3B DC C9 9A   55 85 17 00 46 C5 32 1B  ....;...U...F.2.
#         0010: 35 9B DA 8D                                        5...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 74 87 C7 62 BE 12 19 6E   A5 0E 52 B6 E8 A3 85 5B  t..b...n..R....[
#         0010: C8 6C 6E 11                                        .ln.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B C6 A7 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 09:38:18.000 UTC",
#     "not  after"         : "2024-01-17 09:38:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FC 88 E4 E5 3B DC C9 9A   55 85 17 00 46 C5 32 1B  ....;...U...F.2.
#         0010: 35 9B DA 8D                                        5...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 09:38:40.455 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 09:38:40.604 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 09:38:40.604 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 09:38:40.606 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 09:38:40.606 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 09:38:40.610 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 09:38:40.619 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 09:38:40.619 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 09:38:40.619 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 09:38:40.621 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "07 75 78 15 6C B4 E8 C2 AC 0A 04 70 AC 58 2A FB 4D 62 7E 11 5A 44 FC 2A 63 6A F8 C0 8A FD 14 2F",
#   "session id"          : "85 3B 2F B1 4A ED A1 C6 42 B6 2F EA 47 6B 64 D4 D8 A7 1E 66 75 56 11 2C 45 0F 4D EA A4 EB EF 93",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C7 E3 E4 A6 08 D2 F5 68   50 39 83 DF 06 29 AA 07  .......hP9...)..
#             0010: 61 FB D5 C6 78 E7 17 FC   62 0C BA B2 8F D7 1D 3E  a...x...b......>
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.720 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "14 DF 63 92 2E 0D CA D1 5C CA AB 00 7B 7E 6F 43 92 5C E8 FE 21 62 32 39 5F A8 BD 32 44 A5 78 D1",
#   "session id"          : "85 3B 2F B1 4A ED A1 C6 42 B6 2F EA 47 6B 64 D4 D8 A7 1E 66 75 56 11 2C 45 0F 4D EA A4 EB EF 93",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: AA 2F 61 BF EF A5 B3 72   68 A2 39 15 F3 AA 1F F5  ./a....rh.9.....
#           0010: 45 47 1E B5 A6 E6 CB CD   8F 7C 59 07 F1 08 FE 55  EG........Y....U
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.720 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.720 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.723 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.724 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.724 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.724 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 09:38:40.725 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 09:38:40.725 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.726 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.726 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.738 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.739 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.740 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.744 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.744 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.744 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.744 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.744 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.744 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.744 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 09:38:40.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 09:38:40.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.745 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.745 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.746 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.746 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.746 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.747 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 09:38:40.747 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.754 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 47 F0 9B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 09:38:23.000 UTC",
#       "not  after"         : "2024-01-17 09:38:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 74 87 C7 62 BE 12 19 6E   A5 0E 52 B6 E8 A3 85 5B  t..b...n..R....[
#           0010: C8 6C 6E 11                                        .ln.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C2 DC C3 3E 69 17 BE 78   8D 3A 9D DF 12 3A EC 00  ...>i..x.:...:..
#           0010: 85 6C 75 C0                                        .lu.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.754 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.800 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "51 4F 24 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 09:38:20.000 UTC",
#     "not  after"         : "2024-01-17 09:38:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FC 88 E4 E5 3B DC C9 9A   55 85 17 00 46 C5 32 1B  ....;...U...F.2.
#         0010: 35 9B DA 8D                                        5...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 74 87 C7 62 BE 12 19 6E   A5 0E 52 B6 E8 A3 85 5B  t..b...n..R....[
#         0010: C8 6C 6E 11                                        .ln.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.803 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1E 82 93 EB C8 04 DB 50   28 1B F4 26 09 0F 1D 02  .......P(..&....
#     0010: 9B 60 96 0D 55 7B 14 34   0B 13 1B 9B 3C C2 85 F5  .`..U..4....<...
#     0020: 0C 45 62 45 E4 A1 FC F1   01 02 22 9F 66 62 F6 1E  .EbE......".fb..
#     0030: 8C 5B 09 32 C1 AF F2 5D   63 5F 2E 7D 52 B6 0D 1C  .[.2...]c_..R...
#     0040: 9E D7 E1 47 AC 58 C1 4B   F0 F7 15 C8 05 B7 78 79  ...G.X.K......xy
#     0050: 43 66 5B 65 06 AC CF E8   07 15 73 79 6D EF 84 E3  Cf[e......sym...
#     0060: 85 89 38 A9 37 8C 25 83   DB D4 E1 78 E2 FC 84 72  ..8.7.%....x...r
#     0070: 5D 99 AA A2 4E 0D A2 98   AF 0E 4C AE 13 9F 57 AA  ]...N.....L...W.
#     0080: 31 23 DE 4D 42 12 75 E7   D3 71 AD 80 92 DE 6F 24  1#.MB.u..q....o$
#     0090: F9 C8 40 A3 65 5F FD 30   24 FA 5D 85 68 62 E7 92  ..@.e_.0$.].hb..
#     00A0: F0 73 4C BC 09 56 F2 C1   F0 1F F6 F5 EB FD 4A BE  .sL..V........J.
#     00B0: DC 2A E1 C1 B2 6D 65 32   8E 8A 9E 31 09 A1 B0 A7  .*...me2...1....
#     00C0: AC EB 84 A8 B5 C7 D7 FC   A2 21 24 6B CF 98 F1 84  .........!$k....
#     00D0: 22 38 0C 47 3D 49 D0 09   77 22 18 C7 33 1C A5 C1  "8.G=I..w"..3...
#     00E0: 82 6D 4F 9E 8A 14 F7 93   22 A7 45 77 6B 55 4C 12  .mO.....".EwkUL.
#     00F0: BE B1 B9 E1 90 52 98 5A   77 37 E4 F1 3B B7 22 93  .....R.Zw7..;.".
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.804 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7F 18 9D 81 A2 3D 3F FE   FF 66 00 37 B0 6B 0C C0  .....=?..f.7.k..
#     0010: 03 7B B9 5F 9E 1D 8E AB   9C 2D CE CA A3 04 FA B3  ..._.....-......
#     0020: C0 30 47 68 97 25 C1 DE   89 9A C2 42 42 01 1F DC  .0Gh.%.....BB...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.806 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 09:38:40.806 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 09:38:40.807 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 09:38:40.807 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 09:38:40.807 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 09:38:40.807 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 09:38:40.807 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.807 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.809 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "56 01 46 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 09:38:27.000 UTC",
#       "not  after"         : "2024-01-17 09:38:27.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 74 87 C7 62 BE 12 19 6E   A5 0E 52 B6 E8 A3 85 5B  t..b...n..R....[
#           0010: C8 6C 6E 11                                        .ln.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4A D4 6E 04 B2 56 68 6F   79 AE 8E A7 14 81 AB 17  J.n..Vhoy.......
#           0010: CE B3 A8 89                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "51 4F 24 41",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 09:38:20.000 UTC",
#       "not  after"         : "2024-01-17 09:38:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FC 88 E4 E5 3B DC C9 9A   55 85 17 00 46 C5 32 1B  ....;...U...F.2.
#           0010: 35 9B DA 8D                                        5...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 74 87 C7 62 BE 12 19 6E   A5 0E 52 B6 E8 A3 85 5B  t..b...n..R....[
#           0010: C8 6C 6E 11                                        .ln.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.835 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A1 EE C6 60 A0 71 25 31   69 87 2B A4 7E 55 52 58  ...`.q%1i.+..URX
#     0010: 08 B4 AE 1A 4D D2 F0 84   19 9F D7 90 74 BD 80 13  ....M.......t...
#     0020: AC 4A 4B F0 A4 63 07 0E   07 23 FA D8 08 CD 85 85  .JK..c...#......
#     0030: 5A 5F 92 42 4A 8C 27 66   79 82 8A 23 76 C1 4A EC  Z_.BJ.'fy..#v.J.
#     0040: 2D AB 48 42 C7 72 CC 9E   7C 97 6E 43 56 3E 09 18  -.HB.r....nCV>..
#     0050: A7 EB E0 20 46 C2 00 77   1B 6B BB AC 4E B8 DF C6  ... F..w.k..N...
#     0060: 38 F7 40 62 EB 6B BA 89   F4 FF B7 5D F5 F2 0B C9  8.@b.k.....]....
#     0070: 7E 9D B2 F5 08 18 97 B8   B0 52 4E 4D 69 78 C1 95  .........RNMix..
#     0080: 5E AC B6 55 6B D2 72 B5   09 D2 23 24 24 0D 06 F8  ^..Uk.r...#$$...
#     0090: AF 9F 6D FB 77 F1 6B C5   DE 78 51 E3 ED A8 D0 3C  ..m.w.k..xQ....<
#     00A0: AE 2F 65 48 F8 68 E4 71   CA A0 69 4F 0E 26 5F 45  ./eH.h.q..iO.&_E
#     00B0: B7 09 95 F2 64 55 48 9C   7B BC F8 31 6C 53 EF E7  ....dUH....1lS..
#     00C0: 13 EE 1D 46 4C 35 5E 24   C3 BD 73 69 16 76 50 5F  ...FL5^$..si.vP_
#     00D0: 77 2C 73 6C 98 01 2F 5C   30 63 57 2A 33 41 89 54  w,sl../\0cW*3A.T
#     00E0: BE 9C A0 D0 BB BA B5 41   6D 95 5C 23 7C 34 21 75  .......Am.\#.4!u
#     00F0: 37 BA 87 3F 76 E7 09 CB   EC C4 41 B5 E3 A9 12 D2  7..?v.....A.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.836 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5E 60 04 CE 0B 93 FC 07   63 49 13 A7 50 1F 4A B1  ^`......cI..P.J.
#     0010: CF BD 87 A5 DE 70 D7 5E   FA 73 00 FB E3 4F 1F 7A  .....p.^.s...O.z
#     0020: FD 14 C1 9C 40 3B 04 9A   5C DC 01 4F A4 03 FF 5B  ....@;..\..O...[
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.836 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 09:38:40.889 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5F 4D 1A A3 B7 BF EC 80 54 04 10 DD 5B 8C 36 A3 83 C2 00 F5 C2 C9 F6 2C 95 89 51 41 31 D2 6C FA",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 09:38:40.907 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 09:38:40.907 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 09:38:40.907 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 09:38:40.907 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-19 09:38:41.131 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 09:38:41.132 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 09:38:42.932; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 09:38:42.937; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 09:38:43.602; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@44c79f32(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-YRHAd6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YRHAd6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 09:38:43.604; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-YRHAd6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YRHAd6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 09:38:43.606; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(ca,h=[localhost],a=[],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-YRHAd6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YRHAd6/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 09:38:44.074 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "56 01 46 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 09:38:27.000 UTC",
#     "not  after"         : "2024-01-17 09:38:27.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 74 87 C7 62 BE 12 19 6E   A5 0E 52 B6 E8 A3 85 5B  t.

[...truncated too long message...]

        DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 68 AC 83 6B 3D E9 BA 73   3C 11 F2 00 0F 42 6F 48  h..k=..s<....BoH
#         0010: D9 E7 2E A5                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 09:39:29.690 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "06 7E 83 45",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 09:38:58.000 UTC",
#     "not  after"         : "2024-01-17 09:38:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 52 E1 89 56 C2 2A CB   E5 BF 69 35 B9 EC EE D7  .R..V.*...i5....
#         0010: DE 54 34 B2                                        .T4.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 3D 35 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 09:38:59.000 UTC",
#     "not  after"         : "2024-01-17 09:38:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 52 E1 89 56 C2 2A CB   E5 BF 69 35 B9 EC EE D7  .R..V.*...i5....
#         0010: DE 54 34 B2                                        .T4.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 B8 AA FB A6 BC D7 0B   71 5D 81 AD 4D 24 BF 86  ........q]..M$..
#         0010: BF 44 79 62                                        .Dyb
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 09:39:29.701 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 13938ms
ok 65 stop command for single port in 17142ms
not ok 66 status detects locally running solr in 2319ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 28715 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 224ms
ok 68 listing out files in 6822ms
ok 69 copying files around in 9379ms
ok 70 upconfig in 4962ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1201ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1201ms
not ok 73 Cleanup in 3430ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20477 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 28715 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20477 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 3m 50s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/inap6mfjlk2fa

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 858 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/858/

All tests passed

Build Log:
[...truncated 1298 lines...]
# ERROR: Error from server at http://localhost:39993/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=javabin&version=2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 46 Random placement plugin using ENV in 17838ms
ok 47 Check help command in 4076ms
ok 48 basic post with a type specified in 5767ms
ok 49 basic post WITHOUT a type specified in 12173ms
ok 50 crawling a directory in 4658ms
ok 51 crawling a web site in 5025ms
ok 52 commit and optimize and delete in 4039ms
ok 53 args mode in 6644ms
ok 54 stdin mode in 3524ms
ok 55 post solr log into solr via script in 10296ms
ok 56 post solr log into solr via cli in 7469ms
ok 57 allowPaths - backup in 16891ms
ok 58 start solr with ssl in 19525ms
not ok 59 use different hostname when not checking peer-name in 21422ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 39993 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39993 (pid=3966427). Happy searching!
#
#     INFO  - 2023-10-19 07:12:35.351; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 07:12:35.356; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 07:12:35.813; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-rAvmqf/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rAvmqf/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 07:12:35.912; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-rAvmqf/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rAvmqf/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 07:12:35.913; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-rAvmqf/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rAvmqf/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 07:12:46.488; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 07:12:46.494; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 07:12:46.893; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@751d3241[provider=null,keyStore=file:///tmp/bats-run-rAvmqf/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rAvmqf/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:39993/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 07:12:48.305; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 07:12:48.309; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 07:12:49.138; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 07:12:49.185; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 17086ms
ok 61 start solr with client truststore and security manager in 19926ms
not ok 62 start solr with mTLS needed in 52992ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-rAvmqf/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 39993 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39993 (pid=3969221). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 39994 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]
# Started Solr server on port 39994 (pid=3969332). Happy searching!
#
#     INFO  - 2023-10-19 07:13:51.905; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 07:13:51.917; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 07:13:53.266; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2c1b9e4b(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rAvmqf/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rAvmqf/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 07:13:53.269; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rAvmqf/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rAvmqf/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 07:13:53.271; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(ca,h=[localhost],a=[],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rAvmqf/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rAvmqf/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 07:13:53.329 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 2E 12 A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 07:13:38.000 UTC",
#     "not  after"         : "2024-01-17 07:13:38.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#         0010: 37 5A 48 FA                                        7ZH.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 25 B0 29 43 94 5D FA   EF E5 B8 BD A8 11 82 39  N%.)C.]........9
#         0010: 87 D1 C8 C6                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 5C F6 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 07:13:31.000 UTC",
#     "not  after"         : "2024-01-17 07:13:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A C3 A4 6E 02 B5 45 AB   B5 77 25 33 3B 91 D2 83  Z..n..E..w%3;...
#         0010: 90 47 94 0F                                        .G..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#         0010: 37 5A 48 FA                                        7ZH.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 07:13:53.335 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F C2 CC 08",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 07:13:29.000 UTC",
#     "not  after"         : "2024-01-17 07:13:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A C3 A4 6E 02 B5 45 AB   B5 77 25 33 3B 91 D2 83  Z..n..E..w%3;...
#         0010: 90 47 94 0F                                        .G..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 5C F6 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 07:13:31.000 UTC",
#     "not  after"         : "2024-01-17 07:13:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A C3 A4 6E 02 B5 45 AB   B5 77 25 33 3B 91 D2 83  Z..n..E..w%3;...
#         0010: 90 47 94 0F                                        .G..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#         0010: 37 5A 48 FA                                        7ZH.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 07:13:53.371 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 07:13:53.619 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 07:13:53.620 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 07:13:53.620 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 07:13:53.620 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 07:13:54.105 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:13:54.106 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 07:13:54.109 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 07:13:54.109 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:13:54.116 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:13:54.130 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:13:54.131 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:13:54.131 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:13:54.133 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D7 BA 06 C4 17 7C 91 4A CE 38 24 60 68 C3 D5 5B 72 26 3F CD 10 37 94 D8 25 2C A5 FF 53 8A E2 C7",
#   "session id"          : "03 35 DC 04 B2 0E 35 47 29 D2 93 63 D0 BA B6 72 41 36 18 14 C4 DD 5A AB B2 2B D6 96 EE 2E 35 8A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 4D C6 DC 6D F8 FB 39 69   D2 8E 2C 1B D1 07 6A 70  M..m..9i..,...jp
#             0010: 47 42 34 05 EB 1B EF 65   48 60 0D EB A8 80 DB 37  GB4....eH`.....7
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.304 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9E D0 1C D2 48 BE E6 4F 25 8E 15 93 BC A4 56 B3 26 37 F4 38 00 4B E7 60 E8 7E 8C 07 80 04 90 3D",
#   "session id"          : "03 35 DC 04 B2 0E 35 47 29 D2 93 63 D0 BA B6 72 41 36 18 14 C4 DD 5A AB B2 2B D6 96 EE 2E 35 8A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4D 21 61 B1 82 04 0D AE   A5 3C BC 4B 4C C5 DD 42  M!a......<.KL..B
#           0010: 6E 31 B7 25 9F B8 BE 99   A0 0E EB 70 DC B1 BB 33  n1.%.......p...3
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.304 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.304 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.305 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.306 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.315 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.315 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.323 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.323 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.324 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.326 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.326 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:54.326 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:54.326 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.326 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.327 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.346 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.349 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.350 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.355 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.356 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.356 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.356 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.356 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.356 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.356 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:54.356 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:54.356 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.357 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.358 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.359 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.359 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.360 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.361 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:54.361 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.367 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 37 1B B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 07:13:33.000 UTC",
#       "not  after"         : "2024-01-17 07:13:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#           0010: 37 5A 48 FA                                        7ZH.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 33 3F D1 BE 95 7F 45   8F A9 36 5A 7A 39 3D B6  .3?....E..6Zz9=.
#           0010: 32 8D 6F 6A                                        2.oj
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.367 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.474 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 5C F6 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 07:13:31.000 UTC",
#     "not  after"         : "2024-01-17 07:13:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A C3 A4 6E 02 B5 45 AB   B5 77 25 33 3B 91 D2 83  Z..n..E..w%3;...
#         0010: 90 47 94 0F                                        .G..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#         0010: 37 5A 48 FA                                        7ZH.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.484 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6C 5B 8E 81 5D 94 9F A2   A1 E9 FF 57 E4 62 50 FE  l[..]......W.bP.
#     0010: C9 E2 6F 04 D9 30 63 A5   62 BD 1B F0 5E 6A D4 FC  ..o..0c.b...^j..
#     0020: 47 41 FB 19 97 98 CB B7   EC 96 6F 5C E8 EF C6 90  GA........o\....
#     0030: C2 17 77 9A B0 94 42 61   10 EA 59 A6 04 C6 F1 E4  ..w...Ba..Y.....
#     0040: D8 A3 EF 40 7D A1 97 5C   1C CE 9A 05 93 17 B5 A3  ...@...\........
#     0050: 8B F4 FE 47 1F A1 2C E9   DA 8E 38 B5 18 CA 00 93  ...G..,...8.....
#     0060: 2B 55 D3 15 A5 3B DF 33   7B 4F 25 3F 9D 18 62 AD  +U...;.3.O%?..b.
#     0070: 59 1F 98 C7 8F BB CA 20   CA 9E E5 BA 22 BB E7 DE  Y...... ...."...
#     0080: 04 A2 4E 9D D0 2D 88 0B   98 73 A3 F3 20 BC 0B F9  ..N..-...s.. ...
#     0090: 53 FF 27 59 DF B9 04 BD   95 5A C5 F8 98 24 71 DE  S.'Y.....Z...$q.
#     00A0: 40 17 80 96 E2 5F A4 74   0E 66 D5 F0 0A 45 20 83  @...._.t.f...E .
#     00B0: 08 82 D8 5E 15 B9 F4 3B   E5 11 E0 FF 7D 9B 09 2E  ...^...;........
#     00C0: 0D E2 47 51 1F 13 B8 AC   0F 89 62 2E 66 0B DC 57  ..GQ......b.f..W
#     00D0: BE 48 E3 83 15 D2 04 42   97 AF 6D 9F 10 39 CE 4B  .H.....B..m..9.K
#     00E0: F7 3A AB D0 EE 2D 7C 50   BA 9B 19 03 88 B6 C6 A6  .:...-.P........
#     00F0: 5D 9A 7C 0B FB CB 6D 9C   B3 39 97 E5 98 4F 6A BE  ].....m..9...Oj.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.485 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7E 64 8F C2 CA 3F B5 A3   A6 B0 D0 5B C0 43 8F EA  .d...?.....[.C..
#     0010: 00 AD 6F 50 AA 0F 2F 69   68 26 17 55 68 0E E5 3F  ..oP../ih&.Uh..?
#     0020: F2 61 2A 80 22 40 12 C2   94 56 DA 17 E6 4D 10 21  .a*."@...V...M.!
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.487 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 07:13:54.488 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:54.488 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 07:13:54.488 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:54.488 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 07:13:54.488 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:54.489 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.489 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.495 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 2E 12 A0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 07:13:38.000 UTC",
#       "not  after"         : "2024-01-17 07:13:38.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#           0010: 37 5A 48 FA                                        7ZH.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E 25 B0 29 43 94 5D FA   EF E5 B8 BD A8 11 82 39  N%.)C.]........9
#           0010: 87 D1 C8 C6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 5C F6 00",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 07:13:31.000 UTC",
#       "not  after"         : "2024-01-17 07:13:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A C3 A4 6E 02 B5 45 AB   B5 77 25 33 3B 91 D2 83  Z..n..E..w%3;...
#           0010: 90 47 94 0F                                        .G..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#           0010: 37 5A 48 FA                                        7ZH.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.525 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 03 24 7D 47 80 FC A1 80   59 01 B9 1C E3 29 36 C1  .$.G....Y....)6.
#     0010: 8D F1 E1 7D E7 61 A8 79   10 3B E4 12 06 14 FB 6E  .....a.y.;.....n
#     0020: C8 5B BA 83 BD C8 8A D9   5A 44 06 7A 6A 1D 81 04  .[......ZD.zj...
#     0030: 5C F8 89 2A 18 4C 99 F5   DA 34 E0 65 B8 AF C3 FF  \..*.L...4.e....
#     0040: C5 E9 AC 5B 11 28 BE 5E   CE 91 A8 CB 86 02 17 9E  ...[.(.^........
#     0050: 72 C0 49 6D 27 D8 D0 88   24 53 10 A5 F0 38 71 2E  r.Im'...$S...8q.
#     0060: 58 3F 9E 81 2F 4C 73 2A   32 40 DB 39 F2 AA A1 37  X?../Ls*2@.9...7
#     0070: 80 99 F1 C7 68 DC B3 52   B2 CD DA 8D 3D C0 81 50  ....h..R....=..P
#     0080: 9A 48 4B 33 98 2F 4B 86   89 5D 0A EB E6 5E 9B B3  .HK3./K..]...^..
#     0090: 55 E6 62 45 2C 32 09 DF   45 96 1F E2 98 27 34 3F  U.bE,2..E....'4?
#     00A0: 91 27 FE 5B 3E AE 7E 04   55 71 A5 15 6C 6D C8 AF  .'.[>...Uq..lm..
#     00B0: 4B 11 70 EE BB 62 0A F2   ED 13 FC 90 14 2D 66 67  K.p..b.......-fg
#     00C0: 33 DF D2 92 62 0E 2F 3E   ED BB 0C 68 5B 3F 08 84  3...b./>...h[?..
#     00D0: 8B A1 F6 D3 3E DC E2 28   24 99 38 47 7B 2D 5B 86  ....>..($.8G.-[.
#     00E0: 58 00 83 97 DB 02 65 56   28 E2 45 59 CA 14 8A 8C  X.....eV(.EY....
#     00F0: 1C 92 41 3C EA 75 30 EF   77 DD D1 22 96 2A 70 CC  ..A<.u0.w..".*p.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.526 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F6 FB 76 14 6C E0 C7 B9   C4 3E D6 12 2A FA A7 CA  ..v.l....>..*...
#     0010: 2D 56 F9 4E 83 59 3D 76   79 93 64 2B F7 07 EE 38  -V.N.Y=vy.d+...8
#     0020: 9D 75 50 A5 A3 5F 86 65   F3 67 81 F8 2B 86 B7 7F  .uP.._.e.g..+...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.527 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:54.585 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "32 B7 45 27 F0 A8 9F 1F FD 29 6C 2D FE 70 0D F0 17 90 D2 C5 A8 9C AD C1 A9 13 B6 1A A7 A8 18 90",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 07:13:55.669 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 07:13:55.670 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 07:13:56.737; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 07:13:56.744; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 07:13:57.174; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-rAvmqf/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rAvmqf/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 07:13:57.176; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-rAvmqf/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rAvmqf/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 07:13:57.177; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(ca,h=[localhost],a=[],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-rAvmqf/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rAvmqf/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 07:13:57.213 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 2E 12 A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 07:13:38.000 UTC",
#     "not  after"         : "2024-01-17 07:13:38.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#         0010: 37 5A 48 FA                                        7ZH.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 25 B0 29 43 94 5D FA   EF E5 B8 BD A8 11 82 39  N%.)C.]........9
#         0010: 87 D1 C8 C6                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 5C F6 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 07:13:31.000 UTC",
#     "not  after"         : "2024-01-17 07:13:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A C3 A4 6E 02 B5 45 AB   B5 77 25 33 3B 91 D2 83  Z..n..E..w%3;...
#         0010: 90 47 94 0F                                        .G..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#         0010: 37 5A 48 FA                                        7ZH.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 07:13:57.217 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F C2 CC 08",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 07:13:29.000 UTC",
#     "not  after"         : "2024-01-17 07:13:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A C3 A4 6E 02 B5 45 AB   B5 77 25 33 3B 91 D2 83  Z..n..E..w%3;...
#         0010: 90 47 94 0F                                        .G..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 5C F6 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 07:13:31.000 UTC",
#     "not  after"         : "2024-01-17 07:13:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A C3 A4 6E 02 B5 45 AB   B5 77 25 33 3B 91 D2 83  Z..n..E..w%3;...
#         0010: 90 47 94 0F                                        .G..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#         0010: 37 5A 48 FA                                        7ZH.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 07:13:57.230 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 07:13:57.404 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:13:57.405 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 07:13:57.406 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 07:13:57.407 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:13:57.411 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:13:57.423 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:13:57.423 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:13:57.423 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:13:57.425 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EC 7F E8 23 02 E4 A3 F8 77 B2 91 6D 61 E0 6A F7 E4 97 27 89 CC 97 D7 3B B8 82 FC FF 02 C3 84 CE",
#   "session id"          : "0E F4 C6 36 27 E2 58 87 D3 37 A4 E9 66 EA 4B AA E2 94 99 00 8B ED 16 E5 07 FC 6F DA 6A DF 39 F3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 44 63 A5 39 8A 60 1D 82   F5 AD 72 B3 60 24 A4 73  Dc.9.`....r.`$.s
#             0010: 40 69 EE AA EA 15 D7 E7   F6 10 94 2E 35 D8 BB 17  @i..........5...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.537 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "7A 88 05 F4 E1 35 27 E5 4D 4E 3A BB D5 9C 06 D7 9F 13 AF 17 94 E3 F4 33 A2 38 C2 02 9B A6 4A 6D",
#   "session id"          : "0E F4 C6 36 27 E2 58 87 D3 37 A4 E9 66 EA 4B AA E2 94 99 00 8B ED 16 E5 07 FC 6F DA 6A DF 39 F3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 03 50 1E 8A C7 55 47 1C   70 AD D1 8B 02 48 94 7E  .P...UG.p....H..
#           0010: 9D AA 40 26 95 0D 8E F0   44 80 0A D1 63 91 82 05  ..@&....D...c...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.538 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.538 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.546 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.547 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.547 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.547 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.547 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.547 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.547 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.547 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.552 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.552 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.552 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.552 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.552 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.552 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.552 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.552 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:57.553 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:57.553 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.564 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.568 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.571 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.576 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.576 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.576 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.576 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.581 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:57.581 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:57.581 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.583 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.583 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.584 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.585 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.585 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.588 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:57.588 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.591 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 37 1B B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 07:13:33.000 UTC",
#       "not  after"         : "2024-01-17 07:13:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#           0010: 37 5A 48 FA                                        7ZH.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 33 3F D1 BE 95 7F 45   8F A9 36 5A 7A 39 3D B6  .3?....E..6Zz9=.
#           0010: 32 8D 6F 6A                                        2.oj
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.593 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.668 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 5C F6 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 07:13:31.000 UTC",
#     "not  after"         : "2024-01-17 07:13:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A C3 A4 6E 02 B5 45 AB   B5 77 25 33 3B 91 D2 83  Z..n..E..w%3;...
#         0010: 90 47 94 0F                                        .G..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#         0010: 37 5A 48 FA                                        7ZH.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.671 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0E 65 30 76 C2 6A AA AB   76 AF 3F 30 41 C0 4F C1  .e0v.j..v.?0A.O.
#     0010: 10 E6 0A 42 85 7B E4 B2   30 7E 16 DE 90 2F 15 72  ...B....0..../.r
#     0020: 67 63 62 18 17 96 5D 52   08 5B B4 E9 11 85 1B FC  gcb...]R.[......
#     0030: 78 FB 11 52 D4 BD F4 34   35 33 8A 7B D8 83 08 E3  x..R...453......
#     0040: 07 BF CC 75 54 AA 00 A4   6D 92 79 B0 98 69 7F 3B  ...uT...m.y..i.;
#     0050: 30 BF 4C D2 0D BB 34 44   5D EE 42 DB B1 54 72 5C  0.L...4D].B..Tr\
#     0060: 44 A5 52 49 00 57 C1 30   BF 8C 43 F3 2F 75 39 34  D.RI.W.0..C./u94
#     0070: B5 BB 0A C2 C1 2B 88 D9   63 E8 6F 11 E8 47 12 CE  .....+..c.o..G..
#     0080: 6F 88 8A 8F D4 5D 68 6E   AC 24 9B 2F 52 96 BC 18  o....]hn.$./R...
#     0090: 8C 65 F3 C3 B6 E5 D3 E6   A4 53 63 64 06 D1 57 E8  .e.......Scd..W.
#     00A0: 3C 84 03 17 05 66 DA 18   DB 3F 6B E6 9B 11 45 F9  <....f...?k...E.
#     00B0: 51 8A 1A E2 FA 23 39 BC   AE 0A 9D BF EA CB 3A 10  Q....#9.......:.
#     00C0: 99 2D 8E 5C D1 BE 0F E3   A9 7E 5C 0C 17 52 F1 CF  .-.\......\..R..
#     00D0: EB E4 3D 55 43 50 4F 1E   3D 4D 24 87 CB 2F 65 44  ..=UCPO.=M$../eD
#     00E0: 6F 73 BC F3 E0 1F FB 7F   D7 EE 99 DC 74 E0 FC F6  os..........t...
#     00F0: 71 D8 61 4E 2A C2 A7 AF   10 FE C2 49 94 1B AA A6  q.aN*......I....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.672 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0C 0E 47 40 5A 82 1E 31   FB 1F 83 93 B9 98 DD BD  ..G@Z..1........
#     0010: EE EE 25 98 92 72 49 D0   7B 86 1F 87 85 9F BF A9  ..%..rI.........
#     0020: 14 BC A9 89 7E 6A E2 44   BF A3 C1 7B 94 37 6D 05  .....j.D.....7m.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.674 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 07:13:57.675 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:57.675 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 07:13:57.675 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:57.675 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 07:13:57.675 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:13:57.675 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.676 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.677 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 2E 12 A0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 07:13:38.000 UTC",
#       "not  after"         : "2024-01-17 07:13:38.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#           0010: 37 5A 48 FA                                        7ZH.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E 25 B0 29 43 94 5D FA   EF E5 B8 BD A8 11 82 39  N%.)C.]........9
#           0010: 87 D1 C8 C6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 5C F6 00",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 07:13:31.000 UTC",
#       "not  after"         : "2024-01-17 07:13:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A C3 A4 6E 02 B5 45 AB   B5 77 25 33 3B 91 D2 83  Z..n..E..w%3;...
#           0010: 90 47 94 0F                                        .G..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#           0010: 37 5A 48 FA                                        7ZH.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.704 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6C C5 CC CD 52 7F D1 92   12 8A A5 07 72 3D 7B CB  l...R.......r=..
#     0010: 14 C7 AE A9 77 33 7D A7   B6 B8 9D F3 56 8C F3 7C  ....w3......V...
#     0020: 71 C7 BA A0 78 94 83 73   6E 20 76 45 99 09 5A 31  q...x..sn vE..Z1
#     0030: D9 7F 93 AD 82 07 6C 49   69 67 9B 01 AB 9A 21 5F  ......lIig....!_
#     0040: 6A D0 E3 54 0D 6E F2 68   05 77 FA 81 52 EB 87 97  j..T.n.h.w..R...
#     0050: 5D 18 A6 90 CB 30 E4 27   86 B1 89 6C 19 0C D5 5D  ]....0.'...l...]
#     0060: 29 5D 83 58 C0 34 C4 6D   90 03 B5 5F D7 7D 54 4E  )].X.4.m..._..TN
#     0070: F5 4F AA 2E A9 F3 A9 97   17 5F D0 AF 19 CB 2E 10  .O......._......
#     0080: C9 64 9A 1F AB DF 33 B1   83 3D FB CF 78 19 91 85  .d....3..=..x...
#     0090: 4F 36 65 F7 D7 57 04 98   FC 47 65 05 E7 AB B2 79  O6e..W...Ge....y
#     00A0: F0 36 37 44 51 F3 9B D9   34 3C 63 BB E3 38 D0 46  .67DQ...4<c..8.F
#     00B0: D4 2F 01 8B 6C AB 40 5A   FB 86 9F AC EF B4 49 90  ./..l.@Z......I.
#     00C0: 34 0A 8E 34 27 C2 BC C0   5F 17 92 C6 E2 AE A7 6A  4..4'..._......j
#     00D0: 05 44 B5 2F 42 CA 40 87   E8 AA E4 27 DA E6 AC 01  .D./B.@....'....
#     00E0: CB AC 4E 2E F2 4C 18 83   2E FA 3A EC 88 05 BD 87  ..N..L....:.....
#     00F0: 22 88 0F 72 22 26 CC C4   7A F7 17 9D AE 27 25 B6  "..r"&..z....'%.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.705 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6D E7 8F 57 D6 5B 3D 40   44 E1 F1 6F 8B AB 37 E5  m..W.[=@D..o..7.
#     0010: CA 14 0F F9 61 D7 61 4E   37 63 FF B2 EA 8F 29 C5  ....a.aN7c....).
#     0020: A8 FD 13 EA D7 81 34 F2   4A 7C 38 0D 33 EA 79 3B  ......4.J.8.3.y;
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.709 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 07:13:57.920 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 07:13:57.920 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 07:13:57.920 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 07:13:57.920 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:13:57.930 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "EC 4D F7 FD 2F E5 1D E9 36 5A 9B F4 BA DD 7B B7 0F 94 AE 34 B9 0C 60 0B 55 B8 7B CA 47 1C B1 5D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 07:13:58.195 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 07:13:58.195 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-19 07:14:11.681; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 07:14:12.044 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F C2 CC 08",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 07:13:29.000 UTC",
#       "not  after"         : "2024-01-17 07:13:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A C3 A4 6E 02 B5 45 AB   B5 77 25 33 3B 91 D2 83  Z..n..E..w%3;...
#           0010: 90 47 94 0F                                        .G..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 5C F6 00",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 07:13:31.000 UTC",
#       "not  after"         : "2024-01-17 07:13:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A C3 A4 6E 02 B5 45 AB   B5 77 25 33 3B 91 D2 83  Z..n..E..w%3;...
#           0010: 90 47 94 0F                                        .G..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C5 86 4B EB 9A 0E 4E 84   01 33 33 85 8D 5B 45 EC  ..K...N..33..[E.
#           0010: 37 5A 48 FA                                        7ZH.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 07:14:12.058 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 07:14:12.268 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:14:12.269 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 07:14:12.270 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 07:14:12.271 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:14:12.275 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:14:12.287 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:14:12.287 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:14:12.287 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 07:14:12.289 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "25 24 82 66 E7 0F 50 6F 85 B4 E4 85 6E 56 4A 51 72 99 5D C8 C7 C0 2F E9 67 7D 18 3E 8C C3 C4 7D",
#     "session id"          : "5F 22 8F 3B 65 D5 63 22 BF BD A4 79 99 FA D9 D6 80 3C 11 FD C3 58 F6 59 74 66 BA DC 90 3C 1F 90",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 5A 04 BC FB 0F ED 1D E6   44 39 2F 29 5C 3C E3 31  Z.......D9/)\<.1
#               0010: 39 55 5C 43 A9 06 76 4F   14 C5 26 B7 97 BE FA 30  9U\C..vO..&....0
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 07:14:12.302 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 07:14:12.302 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 07:14:12.302 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 07:14:12.302 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.317 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "03 F9 5E 4D 0B A1 57 2F 3A 1D E4 9F 1A BE F1 1E 2C F2 47 F4 2B 33 9D D3 EF 98 38 7F 88 5D 28 2B",
#     "session id"          : "5F 22 8F 3B 65 D5 63 22 BF BD A4 79 99 FA D9 D6 80 3C 11 FD C3 58 F6 59 74 66 BA DC 90 3C 1F 90",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 41 A0 14 1F 4B 61 0F C5   C0 03 31 AF B4 18 8E 89  A...Ka....1.....
#             0010: BC 43 0C F3 31 AD 05 E3   21 29 E2 3D AD FE 91 43  .C..1...!).=...C
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.317 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.317 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.318 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.318 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.319 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.319 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.319 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.320 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.320 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.320 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.333 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.333 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.333 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.335 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.336 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.336 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:14:12.336 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:14:12.337 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.337 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.337 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.346 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.347 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.350 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 07:14:12.354 UTC|Encryp

[...truncated too long message...]

path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 07:15:26.997 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39994/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14676ms
ok 65 stop command for single port in 17907ms
not ok 66 status detects locally running solr in 1504ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 254ms
ok 68 listing out files in 2799ms
ok 69 copying files around in 6755ms
ok 70 upconfig in 2891ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1240ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1254ms
not ok 73 Cleanup in 2506ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 4s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/k4j3lht7aoayo

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 857 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/857/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196681ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3252ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-19 02:55:04.881; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 02:55:04.928; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 4462ms
not ok 8 accept d option with builtin config in 2216ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-19 02:55:11.595; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 02:55:11.650; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 3328ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-19 02:55:13.857; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 02:55:15.010; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2223ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-19 02:55:17.211; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 02:55:17.260; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 3340ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-19 02:55:19.424; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 02:55:20.577; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 3290ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-19 02:55:22.783; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 02:55:23.942; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 3257ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-19 02:55:26.062; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 02:55:27.211; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 14 can delete collections in 12110ms
ok 15 collection delete also deletes zk config in 8215ms
ok 16 deletes accompanying zk config with nondefault name in 8456ms
ok 17 deleteConfig option can opt to leave config in zk in 6873ms
ok 18 SOLR-16755 test works with noprompt in 24367ms
ok 19 Check export command in 20885ms
ok 20 export fails on non cloud mode in 9031ms
not ok 21 using curl to extract a single pdf file in 8228ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 35955 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35955 (pid=2321). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-19 02:57:10.892; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 02:57:10.943; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 12034ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 35955 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35955 (pid=2784). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-19 02:57:19.653; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 02:57:23.008; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 23 using the bin/solr post tool to crawl web site in 17895ms
ok 24 healthcheck on cloud solr in 29812ms
ok 25 start help flag prints help in 168ms
ok 26 stop help flag prints help in 164ms
ok 27 restart help flag prints help in 171ms
ok 28 status help flag prints help in 53ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 152ms
ok 30 create help flag prints help in 153ms
ok 31 createcore help flag prints help in 165ms
ok 32 createcollection help flag prints help in 166ms
ok 33 delete help flag prints help in 152ms
ok 34 version help flag prints help in 51ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 160ms
ok 36 auth help flag prints help in 167ms
ok 37 assert help flag prints help in 908ms
ok 38 post help flag prints help in 896ms
ok 39 SQL Module in 15437ms
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 18868ms
ok 41 icu collation in analysis-extras module in 13141ms
not ok 42 package detects no running solr in 1212ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 28715 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9447ms
ok 44 deploying and undeploying a collection level package in 12975ms
ok 45 Affinity placement plugin using sysprop in 15641ms
ok 46 Random placement plugin using ENV in 15184ms
ok 47 Check help command in 6125ms
ok 48 basic post with a type specified in 6327ms
ok 49 basic post WITHOUT a type specified in 12585ms
ok 50 crawling a directory in 4785ms
ok 51 crawling a web site in 5161ms
ok 52 commit and optimize and delete in 4043ms
ok 53 args mode in 6261ms
ok 54 stdin mode in 3397ms
not ok 55 post solr log into solr via script in 3349ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-19 03:00:59.476; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 03:00:59.527; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2565ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-19 03:01:02.063; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 03:01:02.115; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10470ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:35955/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-kEinUR%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-19 03:01:12.595; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 03:01:12.645; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:35955/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-kEinUR%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12936ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 35955 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35955 (pid=13731). Happy searching!
#
#     INFO  - 2023-10-19 03:01:19.764; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 03:01:19.771; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 03:01:20.163; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2c1b9e4b(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-kEinUR/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kEinUR/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 03:01:23.589; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 03:01:23.593; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-19 03:01:25.008; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 03:01:25.011; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12564ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 35955 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35955 (pid=14343). Happy searching!
#
#     INFO  - 2023-10-19 03:01:32.788; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 03:01:32.792; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 03:01:33.195; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-kEinUR/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kEinUR/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 03:01:33.279; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-kEinUR/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kEinUR/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 03:01:33.279; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-kEinUR/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kEinUR/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 03:01:36.188; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 03:01:36.195; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-19 03:01:36.910; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5ae81e1[provider=null,keyStore=file:///tmp/bats-run-kEinUR/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kEinUR/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-19 03:01:36.912; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5ae81e1[provider=null,keyStore=file:///tmp/bats-run-kEinUR/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kEinUR/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 03:01:38.000; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 03:01:38.004; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 03:01:38.388; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@2a2da905[provider=null,keyStore=file:///tmp/bats-run-kEinUR/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kEinUR/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 03:01:38.389; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@2a2da905[provider=null,keyStore=file:///tmp/bats-run-kEinUR/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kEinUR/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10495ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 35955 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35955 (pid=15067). Happy searching!
#
#     INFO  - 2023-10-19 03:01:45.303; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 03:01:45.313; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-19 03:01:48.230; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 03:01:48.240; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13517ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-19 03:01:56.804; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 03:02:00.704; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-19 03:02:02.137; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 39866ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-kEinUR/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35955 [|]   [/]   [-]   [\]
# Started Solr server on port 35955 (pid=16677). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35956 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 35956 (pid=16784). Happy searching!
#
#     INFO  - 2023-10-19 03:02:27.567; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 03:02:27.576; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 03:02:28.587; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-kEinUR/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kEinUR/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 03:02:28.589; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5b970f7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-kEinUR/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kEinUR/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 03:02:28.590; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fd4acee(ca,h=[localhost],a=[],w=[]) for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-kEinUR/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kEinUR/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 03:02:28.646 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 A0 26 C1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:02:13.000 UTC",
#     "not  after"         : "2024-01-17 03:02:13.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 B2 CE 0A 97 0A E5 1B   6A 96 8B CC 00 50 D6 A1  ........j....P..
#         0010: BD 42 4E 65                                        .BNe
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C9 3C 7D 0B FF 0A 70 F0   65 29 A7 18 16 AE 6C EA  .<....p.e)....l.
#         0010: B0 00 13 24                                        ...$
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 84 5C E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:02:07.000 UTC",
#     "not  after"         : "2024-01-17 03:02:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 75 26 23 30 4C C6 4A   37 46 A4 B7 DC 1A 6B BA  .u&#0L.J7F....k.
#         0010: 2B F9 3A F9                                        +.:.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 B2 CE 0A 97 0A E5 1B   6A 96 8B CC 00 50 D6 A1  ........j....P..
#         0010: BD 42 4E 65                                        .BNe
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 03:02:28.657 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 84 5C E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:02:07.000 UTC",
#     "not  after"         : "2024-01-17 03:02:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 75 26 23 30 4C C6 4A   37 46 A4 B7 DC 1A 6B BA  .u&#0L.J7F....k.
#         0010: 2B F9 3A F9                                        +.:.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 B2 CE 0A 97 0A E5 1B   6A 96 8B CC 00 50 D6 A1  ........j....P..
#         0010: BD 42 4E 65                                        .BNe
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "55 8C 3C 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:02:05.000 UTC",
#     "not  after"         : "2024-01-17 03:02:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 75 26 23 30 4C C6 4A   37 46 A4 B7 DC 1A 6B BA  .u&#0L.J7F....k.
#         0010: 2B F9 3A F9                                        +.:.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 03:02:28.678 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 03:02:29.024 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 03:02:29.024 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 03:02:29.026 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 03:02:29.026 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 03:02:29.035 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 03:02:29.061 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 03:02:29.062 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 03:02:29.062 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 03:02:29.064 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C3 8C D1 7D 91 F0 7B 68 12 09 90 3C 12 8B 69 E7 F8 A7 FC 59 AE 7B F1 30 51 0F 20 8C ED 12 1B 43",
#   "session id"          : "34 E5 46 9B 06 00 F8 93 70 F8 B9 BA A2 A1 17 9F 84 CE F2 09 22 C9 D5 E2 64 35 73 FB BD AF 4B F4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9A 5D 94 32 64 30 CC 7D   F6 DD 7A 73 45 4E 21 7F  .].2d0....zsEN!.
#             0010: 9F B8 67 42 02 9E 4C FC   96 7D 87 61 A9 84 08 27  ..gB..L....a...'
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.426 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "CB DA 5D DA B0 88 5B DB 03 AB CE A9 BE D6 B8 12 B3 FA 39 2F 68 1F D8 CB 43 CF EC 93 B6 0F 1D 07",
#   "session id"          : "34 E5 46 9B 06 00 F8 93 70 F8 B9 BA A2 A1 17 9F 84 CE F2 09 22 C9 D5 E2 64 35 73 FB BD AF 4B F4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A0 B7 85 3B 21 EE 43 6A   68 99 E3 D2 51 10 27 7F  ...;!.Cjh...Q.'.
#           0010: 19 5D 6B F3 FF F3 AA EB   B5 2B 74 AC 78 B7 65 2C  .]k......+t.x.e,
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.427 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.427 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.432 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.434 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.434 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.436 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.441 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.441 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.442 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.442 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.442 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.443 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.443 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.443 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.443 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 03:02:29.443 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 03:02:29.443 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.443 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.443 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.471 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.475 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.476 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.482 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.483 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.483 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.483 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.483 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.483 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.483 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 03:02:29.483 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 03:02:29.483 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.484 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.485 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.490 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.491 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.491 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.492 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 03:02:29.492 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.496 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6E 26 CD 49",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 03:02:10.000 UTC",
#       "not  after"         : "2024-01-17 03:02:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 B2 CE 0A 97 0A E5 1B   6A 96 8B CC 00 50 D6 A1  ........j....P..
#           0010: BD 42 4E 65                                        .BNe
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 93 47 16 55 78 AB 89   91 47 BC 2F 2E 70 2B 2E  ..G.Ux...G./.p+.
#           0010: A8 9D 80 58                                        ...X
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.497 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.968 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 84 5C E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:02:07.000 UTC",
#     "not  after"         : "2024-01-17 03:02:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 75 26 23 30 4C C6 4A   37 46 A4 B7 DC 1A 6B BA  .u&#0L.J7F....k.
#         0010: 2B F9 3A F9                                        +.:.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 B2 CE 0A 97 0A E5 1B   6A 96 8B CC 00 50 D6 A1  ........j....P..
#         0010: BD 42 4E 65                                        .BNe
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.973 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 58 0C 81 AC C9 D8 4A 6B   8D 73 B9 4C BF 97 8D 72  X.....Jk.s.L...r
#     0010: C5 B4 E3 AD 70 17 26 59   1E A1 9F 75 A7 92 4A 8B  ....p.&Y...u..J.
#     0020: 65 7C 49 76 B4 DC BD D2   50 93 0B E5 76 40 42 03  e.Iv....P...v@B.
#     0030: A9 E3 54 08 7A E7 0C 5D   DD 53 D9 77 0E 08 24 7D  ..T.z..].S.w..$.
#     0040: 43 92 65 63 F1 22 9B AA   AC AE EB 80 70 8F 0A 40  C.ec."......p..@
#     0050: 4C 91 42 84 F5 44 F0 9B   0C B2 21 CB 51 11 21 7A  L.B..D....!.Q.!z
#     0060: B9 FE C0 16 3F A5 0C 63   71 F8 F3 7B 64 0F 40 77  ....?..cq...d.@w
#     0070: 1B 89 1A 5C 4D 6C D1 F7   59 A0 16 44 B9 A9 5F 4C  ...\Ml..Y..D.._L
#     0080: 2D 03 C6 21 05 83 09 B5   0E 84 9A BE E4 7B D8 E6  -..!............
#     0090: B2 F1 AC 21 74 A6 E5 95   93 B3 40 51 9A 30 F7 A8  ...!t.....@Q.0..
#     00A0: 7B 1E 47 DD 1D D8 33 EA   20 53 F3 ED 83 D1 CB EA  ..G...3. S......
#     00B0: 2E 8C 60 C2 2D 8F CB A0   C6 8B 06 12 2C EC 72 7A  ..`.-.......,.rz
#     00C0: 75 77 83 B8 34 FA F9 15   3D 89 42 48 28 4E 9B 1D  uw..4...=.BH(N..
#     00D0: BB 87 DF 65 46 9A 8E 7A   62 BD 35 BB 2D 00 A2 1D  ...eF..zb.5.-...
#     00E0: 4C 9D CC BB 58 3B 71 B5   EB C5 5C 5B 8F E0 B3 6B  L...X;q...\[...k
#     00F0: 75 77 93 51 F7 40 7C BF   DE 4C 36 81 CE 08 85 88  uw.Q.@...L6.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.974 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4F 88 1A 0F D8 53 26 26   20 AD 64 28 0F 80 7F EE  O....S&& .d(....
#     0010: 33 F6 7C 07 1F 90 87 47   AC 95 45 B8 FC 5E C2 55  3......G..E..^.U
#     0020: 38 AA 5F 49 B7 DE FA A2   03 C9 B4 F9 EE 91 1B 36  8._I...........6
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.977 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 03:02:29.978 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 03:02:29.978 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 03:02:29.978 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 03:02:29.978 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 03:02:29.978 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 03:02:29.979 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.979 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:29.980 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 A0 26 C1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 03:02:13.000 UTC",
#       "not  after"         : "2024-01-17 03:02:13.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 B2 CE 0A 97 0A E5 1B   6A 96 8B CC 00 50 D6 A1  ........j....P..
#           0010: BD 42 4E 65                                        .BNe
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C9 3C 7D 0B FF 0A 70 F0   65 29 A7 18 16 AE 6C EA  .<....p.e)....l.
#           0010: B0 00 13 24                                        ...$
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 84 5C E1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 03:02:07.000 UTC",
#       "not  after"         : "2024-01-17 03:02:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 75 26 23 30 4C C6 4A   37 46 A4 B7 DC 1A 6B BA  .u&#0L.J7F....k.
#           0010: 2B F9 3A F9                                        +.:.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 B2 CE 0A 97 0A E5 1B   6A 96 8B CC 00 50 D6 A1  ........j....P..
#           0010: BD 42 4E 65                                        .BNe
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:30.013 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 37 89 10 2B 3A 95 1F 5E   E1 A2 E9 3F 5F 5A 82 66  7..+:..^...?_Z.f
#     0010: 66 4C BB 72 45 31 6A CD   08 66 59 D5 16 C2 11 73  fL.rE1j..fY....s
#     0020: 34 83 5D 51 83 9F 5E 41   E4 C4 AE 3E FB DC 42 D6  4.]Q..^A...>..B.
#     0030: D8 95 8B 3D 51 FC C2 5D   56 99 F3 AA 15 A6 6C 99  ...=Q..]V.....l.
#     0040: 86 AF 85 0F 21 FE 56 B2   4F 7C 7E 8D D7 86 03 3A  ....!.V.O......:
#     0050: FA 5D 84 43 03 E8 15 FC   E7 E2 11 CE A0 D9 D3 E1  .].C............
#     0060: CF A1 D7 FF 86 C5 58 2B   23 7C 32 66 B6 BE 8E 31  ......X+#.2f...1
#     0070: 40 57 EE 53 CE 6A DE 61   35 A0 6E 15 A5 17 2C 41  @W.S.j.a5.n...,A
#     0080: 3F 9C 4B 4D D4 FB 67 09   7B 66 74 B0 9B FF B5 5E  ?.KM..g..ft....^
#     0090: 88 F2 22 4A A5 5B 20 6F   25 F4 43 60 EB 74 C7 BE  .."J.[ o%.C`.t..
#     00A0: B3 8F 08 C8 39 C5 65 D9   59 A4 E6 6F 7D E1 38 C1  ....9.e.Y..o..8.
#     00B0: D6 83 CF C1 18 48 C3 66   DD 3E 9D 76 9B E5 74 CA  .....H.f.>.v..t.
#     00C0: CD 86 F1 11 6F 2B 25 CF   55 34 4E D0 85 B0 0E 0B  ....o+%.U4N.....
#     00D0: 72 AA A1 C8 0D 8B EE EC   67 8F 15 96 61 D2 73 98  r.......g...a.s.
#     00E0: DB 35 A9 7F F9 05 07 25   24 2B 73 1C 27 A4 DF 72  .5.....%$+s.'..r
#     00F0: 4D 34 42 54 65 EF A0 96   4C 34 C4 98 FB D2 43 6E  M4BTe...L4....Cn
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:30.015 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 65 6C 3C 7C 74 F0 94 38   F3 CA 8F B7 EE 9C F9 7F  el<.t..8........
#     0010: 1D DE 15 DF C0 12 59 AE   C1 9B 58 7C C5 EE A4 8D  ......Y...X.....
#     0020: C2 77 3F 58 34 82 8D F5   07 77 75 AE A2 85 78 73  .w?X4....wu...xs
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:30.018 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 03:02:30.072 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "4C A2 18 80 3B 06 7E 72 B9 E6 A1 27 26 A8 2B 9C 04 E5 99 DE 2C 83 C7 43 53 A1 DD 2F 15 E0 B2 12",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:02:30.086 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:02:30.089 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:02:30.089 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:02:30.089 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-19 03:02:30.332 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 03:02:30.333 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 03:02:31.181; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 03:02:31.185; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 03:02:31.659; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-kEinUR/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kEinUR/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 03:02:31.661; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-kEinUR/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kEinUR/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 03:02:31.661; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-kEinUR/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kEinUR/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 03:02:31.697 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 A0 26 C1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:02:13.000 UTC",
#     "not  after"         : "2024-01-17 03:02:13.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 B2 CE 0A 97 0A E5 1B   6A 96 8B CC 00 50 D6 A1  ........j....P..
#         0010: BD 42 4E 65                                        .BNe
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C9 3C 7D 0B FF 0A 70 F0   65 29 A7 18 16 AE 6C EA  .<....p.e)....l.
#         0010: B0 00 13 24                                        ...$
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 84 5C E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:02:07.000 UTC",
#     "not  after"         : "2024-01-17 03:02:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 75 26 23 30 4C C6 4A   37 46 A4 B7 DC 1A 6B BA  .u&#0L.J7F....k.
#         0010: 2B F9 3A F9                                        +.:.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 B2 CE 0A 97 0A E5 1B   6A 96 8B CC 00 50 D6 A1  ........j....P..
#         0010: BD 42 4E 65                                        .BNe
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 03:02:31.700 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 84 5C E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:02:07.000 UTC",
#     "not  after"         : "2024-01-17 03:02:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 75 26 23 30 4C C6 4A   37 46 A4 B7 DC 1A 6B BA  .u&#0L.J7F....k.
#         0010: 2B F9 3A F9                                        +.:.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 B2 CE 0A 97 0A E5 1B   6A 96 8B CC 00 50 D6 A1  ........j....P..
#         0010: BD 42 4E 65                                        .BNe
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "55 8C 3C 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:02:05.000 UTC",
#     "not  after"         : "2024-01-17 03:02:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 75 26 23 30 4C C6 4A   37 46 A4 B7 DC 1A 6B BA  .u&#0L.J7F....k.
#         0010: 2B F9 3A F9                                        +.:.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 03:02:31.711 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 03:02:31.858 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 03:02:31.859 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 03:02:31.860 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 03:02:31.860 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 03:02:31.864 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 03:02:31.873 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 03:02:31.873 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 03:02:31.874 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 03:02:31.875 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   

[...truncated too long message...]

   "not  after"         : "2024-01-17 03:02:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C4 81 CE 87 23 26 41 B4   A9 D0 3B 75 50 85 10 D5  ....#&A...;uP...
#         0010: EA C3 CC 17                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 9A 15 F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:02:47.000 UTC",
#     "not  after"         : "2024-01-17 03:02:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C4 81 CE 87 23 26 41 B4   A9 D0 3B 75 50 85 10 D5  ....#&A...;uP...
#         0010: EA C3 CC 17                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 42 0B 23 0A 04 E2 B4   54 55 1A 5D 87 97 D6 30  eB.#....TU.]...0
#         0010: D1 7C 2D 94                                        ..-.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 03:03:15.414 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:03:15.507 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:03:15.508 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:03:15.508 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:03:15.508 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14231ms
ok 65 stop command for single port in 17105ms
not ok 66 status detects locally running solr in 3591ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1126 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 28715 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1126 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 232ms
ok 68 listing out files in 2865ms
ok 69 copying files around in 14009ms
ok 70 upconfig in 5005ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1222ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1231ms
not ok 73 Cleanup in 4567ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1126 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 28715 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1126 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 41s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/wsm3m5fvdg744

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 856 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/856/

All tests passed

Build Log:
[...truncated 1164 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196024ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3247ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-19 00:13:28.900; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:13:28.950; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 5580ms
not ok 8 accept d option with builtin config in 6695ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-19 00:13:36.821; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:13:41.275; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 4438ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-19 00:13:43.494; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:13:45.747; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 4531ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-19 00:13:48.016; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:13:50.271; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2214ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-19 00:13:52.486; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:13:52.535; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 5564ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-19 00:13:54.755; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:13:58.110; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2191ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-19 00:14:00.300; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:14:00.346; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3171ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-19 00:14:08.727; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:14:08.780; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 4401ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-19 00:14:10.943; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:14:13.195; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 3258ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-19 00:14:15.337; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:14:16.487; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2191ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-19 00:14:18.651; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:14:18.703; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 24569ms
ok 19 Check export command in 21745ms
ok 20 export fails on non cloud mode in 10627ms
ok 21 using curl to extract a single pdf file in 16286ms
ok 22 using the bin/solr post tool to extract content from pdf in 20518ms
ok 23 using the bin/solr post tool to crawl web site in 17963ms
ok 24 healthcheck on cloud solr in 29985ms
ok 25 start help flag prints help in 165ms
ok 26 stop help flag prints help in 157ms
ok 27 restart help flag prints help in 169ms
ok 28 status help flag prints help in 53ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 156ms
ok 30 create help flag prints help in 157ms
ok 31 createcore help flag prints help in 162ms
ok 32 createcollection help flag prints help in 160ms
ok 33 delete help flag prints help in 164ms
ok 34 version help flag prints help in 55ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 170ms
ok 36 auth help flag prints help in 160ms
ok 37 assert help flag prints help in 898ms
ok 38 post help flag prints help in 933ms
not ok 39 SQL Module in 11189ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:39155/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-19 00:16:54.703; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:16:55.861; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:39155/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 21995ms
ok 41 icu collation in analysis-extras module in 19337ms
not ok 42 package detects no running solr in 1319ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 28715 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 12458ms
ok 44 deploying and undeploying a collection level package in 18769ms
ok 45 Affinity placement plugin using sysprop in 21296ms
ok 46 Random placement plugin using ENV in 18744ms
ok 47 Check help command in 3619ms
ok 48 basic post with a type specified in 5610ms
ok 49 basic post WITHOUT a type specified in 11967ms
ok 50 crawling a directory in 4431ms
ok 51 crawling a web site in 4497ms
ok 52 commit and optimize and delete in 4078ms
ok 53 args mode in 6276ms
ok 54 stdin mode in 3332ms
not ok 55 post solr log into solr via script in 8348ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-19 00:19:48.352; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:19:52.808; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 5650ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-19 00:19:55.072; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:19:58.436; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 9734ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:39155/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-rdY4vE%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-19 00:20:08.276; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 00:20:08.323; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:39155/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-rdY4vE%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12621ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 39155 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39155 (pid=13825). Happy searching!
#
#     INFO  - 2023-10-19 00:20:15.680; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 00:20:15.685; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 00:20:16.166; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@44c79f32(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-rdY4vE/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rdY4vE/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 00:20:19.007; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 00:20:19.011; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-19 00:20:20.474; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 00:20:20.478; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12744ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 39155 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39155 (pid=14373). Happy searching!
#
#     INFO  - 2023-10-19 00:20:28.032; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 00:20:28.035; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 00:20:28.554; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-rdY4vE/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rdY4vE/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 00:20:28.656; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-rdY4vE/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rdY4vE/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 00:20:28.657; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-rdY4vE/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rdY4vE/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 00:20:31.651; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 00:20:31.654; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-19 00:20:32.380; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@1133ec6e[provider=null,keyStore=file:///tmp/bats-run-rdY4vE/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rdY4vE/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-19 00:20:32.381; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@1133ec6e[provider=null,keyStore=file:///tmp/bats-run-rdY4vE/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rdY4vE/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 00:20:33.454; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 00:20:33.458; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 00:20:33.851; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-rdY4vE/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rdY4vE/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 00:20:33.852; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-rdY4vE/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rdY4vE/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10898ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 39155 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39155 (pid=14982). Happy searching!
#
#     INFO  - 2023-10-19 00:20:41.007; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 00:20:41.012; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-19 00:20:43.964; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 00:20:43.980; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13783ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-19 00:20:52.718; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-19 00:20:56.620; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-19 00:20:58.336; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 38749ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-rdY4vE/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 39155 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39155 (pid=16616). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 39156 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 39156 (pid=16726). Happy searching!
#
#     INFO  - 2023-10-19 00:21:23.366; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 00:21:23.376; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 00:21:23.837; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-rdY4vE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rdY4vE/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 00:21:23.839; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6175619b(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-rdY4vE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rdY4vE/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 00:21:23.840; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2f058b8a(ca,h=[localhost],a=[],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-rdY4vE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rdY4vE/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 24:21:23.876 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "21 33 5C 4A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 24:21:09.000 UTC",
#     "not  after"         : "2024-01-17 24:21:09.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F8 83 FD F1 9D C2 48 A8   57 10 D1 3A 9C 38 FF F7  ......H.W..:.8..
#         0010: 2C 0E C8 46                                        ,..F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 2F E9 58 FD E7 53 06   AB EB 43 F9 AA 58 8C 8D  ./.X..S...C..X..
#         0010: D5 24 A1 82                                        .$..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 60 8D B8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 24:21:03.000 UTC",
#     "not  after"         : "2024-01-17 24:21:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB EB B3 3B 7F 79 2F 2D   3C 16 08 FB B7 C2 FE 72  ...;.y/-<......r
#         0010: 48 12 7F 82                                        H...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F8 83 FD F1 9D C2 48 A8   57 10 D1 3A 9C 38 FF F7  ......H.W..:.8..
#         0010: 2C 0E C8 46                                        ,..F
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 24:21:23.879 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 60 8D B8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 24:21:03.000 UTC",
#     "not  after"         : "2024-01-17 24:21:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB EB B3 3B 7F 79 2F 2D   3C 16 08 FB B7 C2 FE 72  ...;.y/-<......r
#         0010: 48 12 7F 82                                        H...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F8 83 FD F1 9D C2 48 A8   57 10 D1 3A 9C 38 FF F7  ......H.W..:.8..
#         0010: 2C 0E C8 46                                        ,..F
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 04 DD 5F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 24:21:01.000 UTC",
#     "not  after"         : "2024-01-17 24:21:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EB EB B3 3B 7F 79 2F 2D   3C 16 08 FB B7 C2 FE 72  ...;.y/-<......r
#         0010: 48 12 7F 82                                        H...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 24:21:23.890 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 24:21:24.238 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 24:21:24.239 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 24:21:24.240 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 24:21:24.240 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 24:21:24.244 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 24:21:24.254 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 24:21:24.254 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 24:21:24.254 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 24:21:24.256 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "37 0C EF 00 A9 B7 7B F1 91 FC C8 8F 54 42 A8 81 1E C4 AC DD 1A 62 2C BF 58 F8 55 06 30 FA A8 3D",
#   "session id"          : "78 00 1F 51 DE 9F 3F 22 B4 C3 00 A7 16 32 7B 9F 6E 72 84 78 9C 58 F0 23 30 6F 6D FF 33 05 CC 27",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 71 C4 A6 14 D9 73 93 98   EB D9 AB 1C 49 59 DB DB  q....s......IY..
#             0010: D6 78 23 22 34 85 90 5A   30 90 77 2E C6 FD 24 46  .x#"4..Z0.w...$F
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.337 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "92 11 01 F1 5E C2 EE 0C FC 9C DD 01 5D 5F CC 9D 95 F6 8C 09 51 4D 81 60 97 0B 45 AF 80 5A F5 20",
#   "session id"          : "78 00 1F 51 DE 9F 3F 22 B4 C3 00 A7 16 32 7B 9F 6E 72 84 78 9C 58 F0 23 30 6F 6D FF 33 05 CC 27",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6D 1E 1F D2 3D B2 81 D1   D5 E6 71 18 AA 66 EB 40  m...=.....q..f.@
#           0010: 13 24 74 F8 9A 17 CB 84   19 7D 3C BB 6C F4 A4 60  .$t.......<.l..`
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.338 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.338 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.338 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.338 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.338 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.339 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.339 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.339 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.339 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.339 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.340 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.341 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.341 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.341 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.341 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.341 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.341 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.341 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.341 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.341 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 24:21:24.344 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 24:21:24.345 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.367 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.368 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.372 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.378 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.378 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.378 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.379 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.379 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 24:21:24.379 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 24:21:24.379 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.380 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.380 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.381 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.381 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.381 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.382 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 24:21:24.382 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.385 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 BC 07 D1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 24:21:05.000 UTC",
#       "not  after"         : "2024-01-17 24:21:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F8 83 FD F1 9D C2 48 A8   57 10 D1 3A 9C 38 FF F7  ......H.W..:.8..
#           0010: 2C 0E C8 46                                        ,..F
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 14 DD 4C 33 A4 51 27 B0   F7 AD 24 20 BB A2 96 BB  ..L3.Q'...$ ....
#           0010: 4C 5F A4 AC                                        L_..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.385 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 24:21:24.418 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 24:21:24.419 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 24:21:24.419 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 24:21:24.419 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.441 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 60 8D B8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 24:21:03.000 UTC",
#     "not  after"         : "2024-01-17 24:21:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB EB B3 3B 7F 79 2F 2D   3C 16 08 FB B7 C2 FE 72  ...;.y/-<......r
#         0010: 48 12 7F 82                                        H...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F8 83 FD F1 9D C2 48 A8   57 10 D1 3A 9C 38 FF F7  ......H.W..:.8..
#         0010: 2C 0E C8 46                                        ,..F
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.444 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 12 B5 10 25 39 EE 67 39   F7 45 C3 07 CC F6 13 2C  ...%9.g9.E.....,
#     0010: D2 EB 45 DD 71 C5 6A AE   39 C6 29 B9 B0 5A 3C D8  ..E.q.j.9.)..Z<.
#     0020: B3 8A 72 76 AD 42 41 18   1A 48 4B DE A2 78 60 1F  ..rv.BA..HK..x`.
#     0030: A5 C5 6B AF FD E8 B3 14   A7 6D F4 74 0F 2B 32 B4  ..k......m.t.+2.
#     0040: 78 8F 4D 09 08 A5 4A 9B   C6 A2 FB D0 6B DF 0C 20  x.M...J.....k..
#     0050: 5C 87 09 FC B6 76 ED 58   76 EC 19 71 E4 F8 30 A2  \....v.Xv..q..0.
#     0060: 6E EE EF 2C BD 49 1C F8   E6 B1 27 75 D0 8D 9D E5  n..,.I....'u....
#     0070: AB A6 33 0C C8 53 A3 16   02 52 EE EC A5 25 67 CE  ..3..S...R...%g.
#     0080: 9D 39 4C 58 0F 12 27 A5   B4 0F 06 25 1B 2D B3 32  .9LX..'....%.-.2
#     0090: 06 5C D7 4B D1 D3 84 D5   CD ED 7E CA AD 3D 42 73  .\.K.........=Bs
#     00A0: 36 74 25 90 36 31 28 03   3F 89 AC CC 41 C5 99 CB  6t%.61(.?...A...
#     00B0: F6 D6 CB BA C1 C4 DA F1   36 28 7F 96 3D 71 25 55  ........6(..=q%U
#     00C0: B0 4C 64 D3 62 1C 99 5B   A1 7F 8C 57 04 7A F9 28  .Ld.b..[...W.z.(
#     00D0: 66 BA 90 16 66 29 C1 C6   BD 1F D5 B2 3C CD 8B D9  f...f)......<...
#     00E0: F6 C7 5A AC F2 EF 05 0B   4F D2 BD 0E 1B 79 32 40  ..Z.....O....y2@
#     00F0: 2B BD 67 D0 C4 4A A1 1A   2D E5 CB DC 1F 71 02 34  +.g..J..-....q.4
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.445 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 65 8F 33 07 3F 93 38 58   DC 60 9E A3 5E D0 8D EC  e.3.?.8X.`..^...
#     0010: 2E DE 6D 3F EC B2 71 CD   16 15 1E B3 6F D4 AF 0A  ..m?..q.....o...
#     0020: 6F 83 43 DC 00 0D F9 37   2F 82 B9 28 8E 23 F1 50  o.C....7/..(.#.P
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.446 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 24:21:24.447 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 24:21:24.447 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 24:21:24.447 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 24:21:24.448 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 24:21:24.448 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 24:21:24.448 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.448 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.450 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 33 5C 4A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 24:21:09.000 UTC",
#       "not  after"         : "2024-01-17 24:21:09.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F8 83 FD F1 9D C2 48 A8   57 10 D1 3A 9C 38 FF F7  ......H.W..:.8..
#           0010: 2C 0E C8 46                                        ,..F
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 2F E9 58 FD E7 53 06   AB EB 43 F9 AA 58 8C 8D  ./.X..S...C..X..
#           0010: D5 24 A1 82                                        .$..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3F 60 8D B8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 24:21:03.000 UTC",
#       "not  after"         : "2024-01-17 24:21:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EB EB B3 3B 7F 79 2F 2D   3C 16 08 FB B7 C2 FE 72  ...;.y/-<......r
#           0010: 48 12 7F 82                                        H...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F8 83 FD F1 9D C2 48 A8   57 10 D1 3A 9C 38 FF F7  ......H.W..:.8..
#           0010: 2C 0E C8 46                                        ,..F
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.470 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 34 DB 83 D3 82 9F 30 8D   D6 87 B2 20 4F 7F 96 A5  4.....0.... O...
#     0010: DB B6 CB DE 9C 70 27 9C   A5 81 68 32 4D E5 66 C2  .....p'...h2M.f.
#     0020: EB A0 5D 4C 90 67 E8 2D   20 45 DF 8C C7 EF AF DD  ..]L.g.- E......
#     0030: D1 42 42 1B 7E 3F B6 F7   CF F0 DC 86 56 F4 E5 30  .BB..?......V..0
#     0040: 1D CE A3 D2 98 74 44 C5   C5 D9 80 E8 9A 20 F0 78  .....tD...... .x
#     0050: 50 BC 30 7D 75 17 92 0E   55 54 6B 54 D5 EC CD C7  P.0.u...UTkT....
#     0060: C1 81 8C 48 FA 15 1A 7A   80 2B 37 FC 55 15 E2 D9  ...H...z.+7.U...
#     0070: 02 DC A9 C8 4C 54 A6 B8   89 5D 47 00 33 C4 31 09  ....LT...]G.3.1.
#     0080: B7 2E 7D 01 0C EA F9 F8   9C FD 87 D3 0B F7 E9 9A  ................
#     0090: 9C BD 62 CB 1C 0A B6 05   8B 9D 8D 13 CD 7C 94 8E  ..b.............
#     00A0: AD 16 F8 7D 72 B4 D5 7E   9B EE 2E C6 32 8D C4 CA  ....r.......2...
#     00B0: BA 03 D2 F9 39 B1 8B C9   8C 42 C5 57 48 C3 43 E6  ....9....B.WH.C.
#     00C0: 81 13 61 F2 D7 DA F2 D8   9D 68 07 A2 79 A2 B6 8C  ..a......h..y...
#     00D0: 2D 6E 62 72 14 B7 61 9E   63 50 7B 93 A9 DD F1 5F  -nbr..a.cP....._
#     00E0: 19 A2 2B 28 79 99 4F 14   27 4C A1 38 DB A3 49 41  ..+(y.O.'L.8..IA
#     00F0: B2 EB 6E 7D 22 7B B8 86   C8 CA 32 23 06 54 5D DF  ..n.".....2#.T].
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.471 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AA 07 D4 57 DD 84 A4 91   E1 6A 6B C9 39 B2 1C 66  ...W.....jk.9..f
#     0010: 94 93 27 5A AF 07 15 0B   5A 25 33 2D F9 D2 EB 71  ..'Z....Z%3-...q
#     0020: 49 52 A9 23 45 6E 66 6C   04 8A 8C DF 68 98 73 07  IR.#Enfl....h.s.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.472 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 24:21:24.531 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FF C0 A4 5C AA 32 0D FA 08 A6 B5 AE 07 7F 00 43 8D 91 4D 06 CC 0A FA BF 73 85 8F 63 F0 78 B0 96",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 24:21:25.169 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 24:21:25.170 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 00:21:27.532; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 00:21:27.536; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 00:21:27.881; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-rdY4vE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rdY4vE/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 00:21:27.883; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@165b8a71(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-rdY4vE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rdY4vE/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 00:21:27.883; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6175619b(ca,h=[localhost],a=[],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-rdY4vE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rdY4vE/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 24:21:27.921 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "21 33 5C 4A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 24:21:09.000 UTC",
#     "not  after"         : "2024-01-17 24:21:09.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F8 83 FD F1 9D C2 48 A8   57 10 D1 3A 9C 38 FF F7  ......H.W..:.8..
#         0010: 2C 0E C8 46                                        ,..F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 2F E9 58 FD E7 53 06   AB EB 43 F9 AA 58 8C 8D  ./.X..S...C..X..
#         0010: D5 24 A1 82                                        .$..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 60 8D B8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 24:21:03.000 UTC",
#     "not  after"         : "2024-01-17 24:21:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB EB B3 3B 7F 79 2F 2D   3C 16 08 FB B7 C2 FE 72  ...;.y/-<......r
#         0010: 48 12 7F 82                                        H...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F8 83 FD F1 9D C2 48 A8   57 10 D1 3A 9C 38 FF F7  ......H.W..:.8..
#         0010: 2C 0E C8 46                                        ,..F
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 24:21:27.925 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 60 8D B8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 24:21:03.000 UTC",
#     "not  after"         : "2024-01-17 24:21:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB EB B3 3B 7F 79 2F 2D   3C 16 08 FB B7 C2 FE 72  ...;.y/-<......r
#         0010: 48 12 7F 82                                        H...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           Pat

[...truncated too long message...]

     }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 24:22:13.549 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 63 A8 8A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 24:21:42.000 UTC",
#     "not  after"         : "2024-01-17 24:21:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 40 35 D8 31 AA 18 7E 94   F3 9E 8D E7 1B DE 89 88  @5.1............
#         0010: 2F 4D CF 33                                        /M.3
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9E 36 9D 3E 87 1C F6 99   47 45 F8 EC 11 5C 96 DC  .6.>....GE...\..
#         0010: 3B 78 5F 88                                        ;x_.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 30 5E EA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 24:21:40.000 UTC",
#     "not  after"         : "2024-01-17 24:21:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 40 35 D8 31 AA 18 7E 94   F3 9E 8D E7 1B DE 89 88  @5.1............
#         0010: 2F 4D CF 33                                        /M.3
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 24:22:13.559 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 13537ms
ok 65 stop command for single port in 16913ms
not ok 66 status detects locally running solr in 3500ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1126 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 28715 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1126 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 235ms
ok 68 listing out files in 2809ms
ok 69 copying files around in 13891ms
ok 70 upconfig in 5991ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1215ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1204ms
not ok 73 Cleanup in 4535ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1126 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 28715 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1126 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 46s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/i4fkdrzhmoh66

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 855 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/855/

All tests passed

Build Log:
[...truncated 1164 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196233ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3175ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-18 21:27:54.352; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:27:54.401; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 2294ms
not ok 8 accept d option with builtin config in 2271ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-18 21:27:58.964; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:27:59.019; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2208ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-18 21:28:01.200; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:28:01.248; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 4515ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-18 21:28:03.538; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:28:05.792; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2210ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-18 21:28:07.962; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:28:08.027; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 5529ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-18 21:28:10.231; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:28:13.585; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2171ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-18 21:28:15.724; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:28:15.775; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 5559ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-18 21:28:24.316; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:28:26.569; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 3350ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-18 21:28:28.821; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:28:29.973; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2248ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-18 21:28:32.183; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:28:32.238; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2109ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-18 21:28:34.323; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:28:34.375; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 22893ms
ok 19 Check export command in 21595ms
ok 20 export fails on non cloud mode in 8454ms
not ok 21 using curl to extract a single pdf file in 10792ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 45385 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45385 (pid=18299). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-18 21:29:36.547; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:29:38.803; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8200ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 45385 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45385 (pid=18771). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-18 21:29:47.019; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:29:47.067; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 14185ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 45385 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45385 (pid=19196). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-18 21:29:55.704; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:30:01.272; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30600ms
ok 25 start help flag prints help in 161ms
ok 26 stop help flag prints help in 156ms
ok 27 restart help flag prints help in 170ms
ok 28 status help flag prints help in 52ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 158ms
ok 30 create help flag prints help in 159ms
ok 31 createcore help flag prints help in 156ms
ok 32 createcollection help flag prints help in 168ms
ok 33 delete help flag prints help in 155ms
ok 34 version help flag prints help in 50ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 157ms
ok 36 auth help flag prints help in 153ms
ok 37 assert help flag prints help in 880ms
ok 38 post help flag prints help in 884ms
not ok 39 SQL Module in 9527ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:45385/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-18 21:30:45.290; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:30:45.338; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:45385/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19858ms
not ok 41 icu collation in analysis-extras module in 8176ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-18 21:31:13.387; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:31:13.440; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1221ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 28715 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9710ms
not ok 44 deploying and undeploying a collection level package in 196161ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 45385 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45385 (pid=23377). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 13358ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-18 21:34:50.343; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:34:50.391; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-18 21:34:51.304; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:34:53.554; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 12534ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-18 21:35:03.944; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:35:05.097; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-18 21:35:06.074; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:35:06.124; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3506ms
not ok 48 basic post with a type specified in 1291ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1526ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1172ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1168ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1275ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1279ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1254ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 6160ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-18 21:35:33.598; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:35:35.854; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 3400ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-18 21:35:38.115; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 21:35:39.270; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 57 allowPaths - backup in 15426ms
ok 58 start solr with ssl in 19315ms
ok 59 use different hostname when not checking peer-name in 30511ms
ok 60 start solr with ssl and auth in 17164ms
ok 61 start solr with client truststore and security manager in 19348ms
not ok 62 start solr with mTLS needed in 37772ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-vc97Vx/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 45385 [|]   [/]   [-]   [\]
# Started Solr server on port 45385 (pid=1344). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 45386 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 45386 (pid=1469). Happy searching!
#
#     INFO  - 2023-10-18 21:37:46.830; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 21:37:46.834; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 21:37:47.226; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-vc97Vx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vc97Vx/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 21:37:47.229; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-vc97Vx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vc97Vx/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 21:37:47.229; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5b970f7(ca,h=[localhost],a=[],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-vc97Vx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vc97Vx/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 21:37:47.269 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B A6 D1 02",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 21:37:32.000 UTC",
#     "not  after"         : "2024-01-16 21:37:32.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 93 BF 5D 76 25 26 1C   8C BA F6 E5 40 B2 1D 35  ...]v%&.....@..5
#         0010: 26 02 F4 75                                        &..u
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 21 8F 04 73 D8 39 E7 A4   CD 9E 8B CE 77 ED B6 92  !..s.9......w...
#         0010: E5 1C 91 AD                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 C5 C7 5B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 21:37:26.000 UTC",
#     "not  after"         : "2024-01-16 21:37:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 25 8D 4C E2 48 D0 00   EE A1 DA 58 25 37 27 99  .%.L.H.....X%7'.
#         0010: C7 38 0B 96                                        .8..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 93 BF 5D 76 25 26 1C   8C BA F6 E5 40 B2 1D 35  ...]v%&.....@..5
#         0010: 26 02 F4 75                                        &..u
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 21:37:47.272 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 C5 C7 5B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 21:37:26.000 UTC",
#     "not  after"         : "2024-01-16 21:37:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 25 8D 4C E2 48 D0 00   EE A1 DA 58 25 37 27 99  .%.L.H.....X%7'.
#         0010: C7 38 0B 96                                        .8..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 93 BF 5D 76 25 26 1C   8C BA F6 E5 40 B2 1D 35  ...]v%&.....@..5
#         0010: 26 02 F4 75                                        &..u
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D D7 68 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 21:37:24.000 UTC",
#     "not  after"         : "2024-01-16 21:37:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 25 8D 4C E2 48 D0 00   EE A1 DA 58 25 37 27 99  .%.L.H.....X%7'.
#         0010: C7 38 0B 96                                        .8..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 21:37:47.284 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 21:37:47.658 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 21:37:47.658 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 21:37:47.660 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 21:37:47.660 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 21:37:47.664 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 21:37:47.673 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 21:37:47.674 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 21:37:47.674 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 21:37:47.676 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "FE 85 9D 5A 7D F7 AE 37 37 C0 0C FE E4 0B 91 CC 2C 3F 96 6B 46 7E 9E 49 E6 79 04 C1 04 9B 97 DC",
#   "session id"          : "54 51 81 FC 49 79 B0 F5 EE D3 14 87 1A F1 0B A1 AD 71 96 62 C9 93 8E 23 D5 3E C5 CF 1C EC 1A D5",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D3 49 9C FA 67 D3 0A 16   72 8E D9 53 3A 4C F2 39  .I..g...r..S:L.9
#             0010: 76 8C A7 62 13 F7 74 89   E6 81 30 90 A8 B5 F3 3D  v..b..t...0....=
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.809 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B5 A0 23 6F 0C 24 2C 65 29 74 71 CE EA 2D B2 AB F1 69 AB 41 10 61 B3 75 54 28 37 E6 0A 8A DB DD",
#   "session id"          : "54 51 81 FC 49 79 B0 F5 EE D3 14 87 1A F1 0B A1 AD 71 96 62 C9 93 8E 23 D5 3E C5 CF 1C EC 1A D5",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 91 69 41 B9 02 1D EA 13   76 C2 89 9F 06 C5 43 99  .iA.....v.....C.
#           0010: 92 58 C1 F6 75 24 2A 2A   F5 61 11 5F 4C DC 15 52  .X..u$**.a._L..R
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.810 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.810 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.811 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.812 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.812 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.812 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.812 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.813 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.813 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.813 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.825 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.830 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.830 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.831 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.831 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.832 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.832 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.832 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.832 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 21:37:47.832 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 21:37:47.832 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.833 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.833 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.864 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.865 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.866 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.869 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.869 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.870 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.870 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.870 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 21:37:47.870 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 21:37:47.870 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.872 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.872 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.872 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.872 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.873 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.873 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 21:37:47.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.880 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6B BD 51 AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 21:37:28.000 UTC",
#       "not  after"         : "2024-01-16 21:37:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 93 BF 5D 76 25 26 1C   8C BA F6 E5 40 B2 1D 35  ...]v%&.....@..5
#           0010: 26 02 F4 75                                        &..u
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 12 8F DB E1 48 67 CF   CB 8C AD 73 9A 6C D3 0B  .....Hg....s.l..
#           0010: AF 28 49 D3                                        .(I.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:47.880 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:48.133 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 C5 C7 5B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 21:37:26.000 UTC",
#     "not  after"         : "2024-01-16 21:37:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 25 8D 4C E2 48 D0 00   EE A1 DA 58 25 37 27 99  .%.L.H.....X%7'.
#         0010: C7 38 0B 96                                        .8..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 93 BF 5D 76 25 26 1C   8C BA F6 E5 40 B2 1D 35  ...]v%&.....@..5
#         0010: 26 02 F4 75                                        &..u
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:48.142 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4B 7B 56 DA 14 F8 C0 A3   3F 7F E2 62 7B 21 CA 65  K.V.....?..b.!.e
#     0010: 88 0F 3C 2C 43 69 20 08   0E E1 E8 D5 6D 57 EB CB  ..<,Ci .....mW..
#     0020: 4D 8D 94 0E 6C 0A 9F 03   FA 66 75 8C 95 7D D0 D4  M...l....fu.....
#     0030: 51 C4 AE DB 95 20 F2 97   43 92 D5 BF 1A B0 ED EA  Q.... ..C.......
#     0040: CA 3F E2 15 FE DA DA 4A   10 66 0E 74 C5 D1 F0 4F  .?.....J.f.t...O
#     0050: A3 19 09 80 5D 7D 3E 63   43 7D FA F3 FB 0B CF C7  ....].>cC.......
#     0060: AE 90 7B 6F EA 18 AA 2E   20 CB D4 7B B9 8B 90 F9  ...o.... .......
#     0070: 2C 13 49 F7 F9 F3 AC F4   34 1C 40 27 3E 3C 69 4A  ,.I.....4.@'><iJ
#     0080: AE 59 B2 35 9F 9D 85 F6   1B 29 97 B3 FF FE 5F 49  .Y.5.....)...._I
#     0090: 8F 7A EF 4E 24 D6 BC 29   54 C4 C4 07 9A 73 8C 09  .z.N$..)T....s..
#     00A0: 1A 38 7A 48 7F 72 FA C3   DC FB 24 7D 17 59 86 D0  .8zH.r....$..Y..
#     00B0: 83 74 70 8B 8A 26 CA 8F   F2 0E 1A D7 8B AE C9 1C  .tp..&..........
#     00C0: E5 3D E0 23 BD 42 DD E3   25 DD 92 09 A3 FC E6 86  .=.#.B..%.......
#     00D0: BE 2D 52 08 55 A4 10 4B   4B 8F 17 3C 81 00 71 1C  .-R.U..KK..<..q.
#     00E0: F8 C5 86 DF A1 93 40 BB   B7 F0 61 8B 8F 16 BC 97  ......@...a.....
#     00F0: 49 3F 2F C3 15 02 46 DE   A8 5F 66 35 CD 15 66 5D  I?/...F.._f5..f]
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:48.144 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1B 6B CC FE 54 B8 A4 01   A0 2E D7 FE 79 43 A3 15  .k..T.......yC..
#     0010: 80 0B 28 19 3B 38 77 69   0C 24 99 39 C1 E4 AC 1D  ..(.;8wi.$.9....
#     0020: 9F D9 D3 F4 42 00 74 C1   A9 FE E3 E8 87 FE C2 A6  ....B.t.........
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:48.145 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 21:37:48.146 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 21:37:48.146 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 21:37:48.146 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 21:37:48.146 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 21:37:48.146 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 21:37:48.146 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:48.146 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:48.148 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B A6 D1 02",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 21:37:32.000 UTC",
#       "not  after"         : "2024-01-16 21:37:32.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 93 BF 5D 76 25 26 1C   8C BA F6 E5 40 B2 1D 35  ...]v%&.....@..5
#           0010: 26 02 F4 75                                        &..u
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 21 8F 04 73 D8 39 E7 A4   CD 9E 8B CE 77 ED B6 92  !..s.9......w...
#           0010: E5 1C 91 AD                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "29 C5 C7 5B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 21:37:26.000 UTC",
#       "not  after"         : "2024-01-16 21:37:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 25 8D 4C E2 48 D0 00   EE A1 DA 58 25 37 27 99  .%.L.H.....X%7'.
#           0010: C7 38 0B 96                                        .8..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 93 BF 5D 76 25 26 1C   8C BA F6 E5 40 B2 1D 35  ...]v%&.....@..5
#           0010: 26 02 F4 75                                        &..u
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:48.169 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2A 4E AD 0F DD 09 A0 B8   33 E7 CB 33 36 22 6C 3D  *N......3..36"l=
#     0010: 10 07 C3 FE 91 50 19 54   3A 12 3E 79 B4 EA 24 4C  .....P.T:.>y..$L
#     0020: BD 6F 9E 7A 57 E0 1A B1   6D 0B 80 CA 18 0E AB 15  .o.zW...m.......
#     0030: 3A 05 DE EE D1 3D BB A9   5E 2C 09 53 E1 3D A0 EB  :....=..^,.S.=..
#     0040: 24 DF 5D 09 A2 6F 99 3D   91 9E 69 79 53 C0 8B 70  $.]..o.=..iyS..p
#     0050: 99 DF 57 B6 A3 7F D4 A5   A8 57 F0 76 13 90 2A D8  ..W......W.v..*.
#     0060: CD D9 0B 39 DE 55 BD 19   90 DB 80 E8 D2 AE E6 80  ...9.U..........
#     0070: 2E 18 7E 19 42 EC D1 E9   8D 9A 38 30 DB 5D 02 AF  ....B.....80.]..
#     0080: 28 45 77 C4 4A F6 CA B4   72 DD C0 D9 49 49 F4 FF  (Ew.J...r...II..
#     0090: 94 33 74 1C 3A CE C2 EE   51 92 DB 4F D0 52 81 76  .3t.:...Q..O.R.v
#     00A0: 84 46 18 9D 11 08 93 73   7B 64 05 58 73 5C 67 3C  .F.....s.d.Xs\g<
#     00B0: B2 0A 84 B7 AC 96 B9 1C   4E A3 E9 EF A9 0B F1 EC  ........N.......
#     00C0: 9F AC D3 A8 E4 DB A2 9A   B0 2F D6 A3 C1 0A 23 2D  ........./....#-
#     00D0: B2 40 0A D9 D3 0F 20 EC   99 05 33 07 CA BE 85 0A  .@.... ...3.....
#     00E0: 68 87 AA BB 7C ED 8D 53   76 11 5F E9 4B 85 04 6F  h......Sv._.K..o
#     00F0: 6C 95 3E 95 FD CE 61 B8   6A 8E 20 09 25 ED 7B 6F  l.>...a.j. .%..o
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:48.170 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5A 6A 26 68 3D 7F C0 5D   05 98 37 69 61 4D 51 84  Zj&h=..]..7iaMQ.
#     0010: 76 E3 F6 E2 52 67 45 AA   0F 30 F1 E7 8D F0 C2 2E  v...RgE..0......
#     0020: AF 95 B1 F4 40 3C B3 CB   71 0E 1C 09 F2 23 5D AD  ....@<..q....#].
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 21:37:48.171 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-18 21:37:48.223 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DC EC 5E D7 59 A8 F8 27 4B 15 73 61 38 C4 75 EC E6 48 BB BA D0 27 4E 45 AC 84 8B 04 D9 28 5F D0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 21:37:48.995 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 21:37:48.996 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 21:37:51.137; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 21:37:51.140; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 21:37:51.453; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@743cb8e0(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-vc97Vx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vc97Vx/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 21:37:51.455; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-vc97Vx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vc97Vx/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 21:37:51.455; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(ca,h=[localhost],a=[],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-vc97Vx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vc97Vx/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 21:37:51.493 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B A6 D1 02",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 21:37:32.000 UTC",
#     "not  after"         : "2024-01-16 21:37:32.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 93 BF 5D 76 25 26 1C   8C BA F6 E5 40 B2 1D 35  ...]v%&.....@..5
#         0010: 26 02 F4 75                                        &..u
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 21 8F 04 73 D8 39 E7 A4   CD 9E 8B CE 77 ED B6 92  !..s.9......w...
#         0010: E5 1C 91 AD                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 C5 C7 5B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 21:37:26.000 UTC",
#     "not  after"         : "2024-01-16 21:37:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 25 8D 4C E2 48 D0 00   EE A1 DA 58 25 37 27 99  .%.L.H.....X%7'.
#         0010: C7 38 0B 96                                        .8..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 93 BF 5D 76 25 26 1C   8C BA F6 E5 40 B2 1D 35  ...]v%&.....@..5
#         0010: 26 02 F4 75                                        &..u
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 21:37:51.496 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 C5 C7 5B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 21:37:26.000 UTC",
#     "not  after"         : "2024-01-16 21:37:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 25 8D 4C E2 48 D0 00   EE A1 DA 58 25 37 27 99  .%.L.H.....X%7'.
#         0010: C7 38 0B 96                                        .8..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 93 BF 5D 76 25 26 1C   8C BA F6 E5 40 B2 1D 35  ...]v%&.....@..5
#         0010: 26 02 F4 75                                        &..u
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D D7 68 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 21:37:24.000 UTC",
#     "not  after"         : "2024-01-16 21:37:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 25 8D 4C E2 48 D0 00   EE A1 DA 58 25 37 27 99  .%.L.H.....X%7'.
#         0010: C7 38 0B 96                                        .8..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 21:37:51.509 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 21:37:52.027 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 21:37:52.027 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 21:37:52.028 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 21:37:52.028 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 21:37:52.032 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 21:37:52.042 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 21:37:52.042 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 21:37:52.042 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 21:37:52.044 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D5 2A 3D 00 CA 67 31 0D 2A 52 DB E9 B9 2D FF 00 4A 50 71 4F 3D 66 A9 36 CC C2 1E 9A 7E 4B D9 10",
#   "session id"          : "FB D4 5A CF 41 04 B3 66 28 EC 07 79 73 7A 01 47 7B 35 56 E2 3A A9 B1 3C 62 55 B7 8F AB 91 E3 F3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_s

[...truncated too long message...]

main|2023-10-18 21:37:56.361 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 C5 C7 5B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 21:37:26.000 UTC",
#     "not  after"         : "2024-01-16 21:37:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 25 8D 4C E2 48 D0 00   EE A1 DA 58 25 37 27 99  .%.L.H.....X%7'.
#         0010: C7 38 0B 96                                        .8..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 93 BF 5D 76 25 26 1C   8C BA F6 E5 40 B2 1D 35  ...]v%&.....@..5
#         0010: 26 02 F4 75                                        &..u
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D D7 68 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 21:37:24.000 UTC",
#     "not  after"         : "2024-01-16 21:37:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 25 8D 4C E2 48 D0 00   EE A1 DA 58 25 37 27 99  .%.L.H.....X%7'.
#         0010: C7 38 0B 96                                        .8..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 21:37:56.372 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 63 start solr with mTLS wanted in 48762ms
ok 64 SOLR-11740 check 'solr stop' connection in 15004ms
ok 65 stop command for single port in 17593ms
not ok 66 status detects locally running solr in 3413ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1126 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 28715 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1126 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 230ms
ok 68 listing out files in 6048ms
ok 69 copying files around in 16009ms
ok 70 upconfig in 4922ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1211ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1199ms
not ok 73 Cleanup in 4454ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 28715 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1126 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 28715 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1126 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 32s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/er7phbqmdhpmm

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 854 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/854/

All tests passed

Build Log:
[...truncated 1305 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-18 17:42:36.497; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 17:42:41.184; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 4556ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-18 17:42:43.480; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 17:42:45.739; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 9703ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:39117/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-G2xW0d%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-18 17:42:55.532; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 17:42:55.583; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:39117/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-G2xW0d%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12180ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 39117 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39117 (pid=12884). Happy searching!
#
#     INFO  - 2023-10-18 17:43:02.825; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 17:43:02.829; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 17:43:03.230; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-G2xW0d/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-G2xW0d/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-18 17:43:06.049; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-18 17:43:06.053; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-18 17:43:07.497; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 17:43:07.501; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12444ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 39117 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39117 (pid=13478). Happy searching!
#
#     INFO  - 2023-10-18 17:43:14.931; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 17:43:14.935; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 17:43:15.350; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-G2xW0d/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-G2xW0d/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 17:43:15.418; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-G2xW0d/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-G2xW0d/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 17:43:15.418; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-G2xW0d/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-G2xW0d/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-18 17:43:18.440; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-18 17:43:18.444; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-18 17:43:18.858; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5ae81e1[provider=null,keyStore=file:///tmp/bats-run-G2xW0d/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-G2xW0d/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-18 17:43:18.859; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5ae81e1[provider=null,keyStore=file:///tmp/bats-run-G2xW0d/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-G2xW0d/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 17:43:19.941; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 17:43:19.945; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 17:43:20.369; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-G2xW0d/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-G2xW0d/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 17:43:20.370; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-G2xW0d/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-G2xW0d/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10667ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 39117 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39117 (pid=14170). Happy searching!
#
#     INFO  - 2023-10-18 17:43:27.454; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 17:43:27.458; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-18 17:43:30.378; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 17:43:30.382; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13847ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-18 17:43:39.336; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-18 17:43:43.012; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-18 17:43:44.557; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 62 start solr with mTLS needed in 64311ms
ok 63 start solr with mTLS wanted in 50832ms
ok 64 SOLR-11740 check 'solr stop' connection in 15465ms
ok 65 stop command for single port in 17306ms
not ok 66 status detects locally running solr in 2480ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1126 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1126 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 237ms
ok 68 listing out files in 8308ms
ok 69 copying files around in 8512ms
ok 70 upconfig in 2840ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1220ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1235ms
not ok 73 Cleanup in 3443ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1126 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1126 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 29s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/uxulwrlvdtvf6

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 853 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/853/

All tests passed

Build Log:
[...truncated 1296 lines...]
# ERROR: Error from server at http://localhost:40899/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=javabin&version=2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 46 Random placement plugin using ENV in 16242ms
ok 47 Check help command in 4537ms
ok 48 basic post with a type specified in 5580ms
ok 49 basic post WITHOUT a type specified in 11881ms
ok 50 crawling a directory in 4556ms
ok 51 crawling a web site in 5344ms
ok 52 commit and optimize and delete in 4115ms
ok 53 args mode in 6708ms
ok 54 stdin mode in 3408ms
ok 55 post solr log into solr via script in 10021ms
ok 56 post solr log into solr via cli in 7297ms
ok 57 allowPaths - backup in 16646ms
ok 58 start solr with ssl in 18788ms
not ok 59 use different hostname when not checking peer-name in 20999ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 40899 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40899 (pid=2037070). Happy searching!
#
#     INFO  - 2023-10-18 14:42:53.550; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 14:42:53.555; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 14:42:53.966; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-Z4eOab/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Z4eOab/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 14:42:54.054; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-Z4eOab/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Z4eOab/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 14:42:54.055; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-Z4eOab/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Z4eOab/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-18 14:43:04.300; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-18 14:43:04.305; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-18 14:43:04.676; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-Z4eOab/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Z4eOab/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:40899/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 14:43:06.075; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 14:43:06.080; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 14:43:06.879; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 14:43:06.915; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 17017ms
ok 61 start solr with client truststore and security manager in 20094ms
not ok 62 start solr with mTLS needed in 53707ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-Z4eOab/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40899 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40899 (pid=2039792). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40900 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40900 (pid=2039903). Happy searching!
#
#     INFO  - 2023-10-18 14:44:10.360; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 14:44:10.366; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 14:44:10.887; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-Z4eOab/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Z4eOab/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 14:44:10.889; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-Z4eOab/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Z4eOab/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 14:44:10.889; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-Z4eOab/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Z4eOab/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 14:44:10.944 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 58 7D 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 14:43:56.000 UTC",
#     "not  after"         : "2024-01-16 14:43:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#         0010: E0 1D D2 63                                        ...c
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 FA 2B 91 67 A8 B2 C0   3B 7F 92 BA C8 F2 7E 71  ..+.g...;......q
#         0010: A9 6C 1E 0B                                        .l..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 44 3B 80",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 14:43:49.000 UTC",
#     "not  after"         : "2024-01-16 14:43:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E C1 FE 84 C1 C3 F4 A0   B2 F2 65 D6 E8 D9 21 E5  ..........e...!.
#         0010: 14 54 2A 61                                        .T*a
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#         0010: E0 1D D2 63                                        ...c
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 14:44:10.953 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C D9 80 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 14:43:47.000 UTC",
#     "not  after"         : "2024-01-16 14:43:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E C1 FE 84 C1 C3 F4 A0   B2 F2 65 D6 E8 D9 21 E5  ..........e...!.
#         0010: 14 54 2A 61                                        .T*a
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 44 3B 80",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 14:43:49.000 UTC",
#     "not  after"         : "2024-01-16 14:43:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E C1 FE 84 C1 C3 F4 A0   B2 F2 65 D6 E8 D9 21 E5  ..........e...!.
#         0010: 14 54 2A 61                                        .T*a
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#         0010: E0 1D D2 63                                        ...c
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 14:44:10.980 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 14:44:11.743 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:11.743 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 14:44:11.745 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 14:44:11.745 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:11.755 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:11.784 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:11.784 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:11.784 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:11.787 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2B 8F 7B 5F FF AC E2 13 70 34 3B 21 7D 0D F7 7B 0D F0 AE A9 D6 DA F7 40 83 A7 CE 81 4C AE C8 5D",
#   "session id"          : "F9 6A 9B ED 8E AB A4 34 51 1D F3 99 BE FE 0F C3 7D FA 9E 73 46 E7 D7 B6 5B 75 BF 46 18 BF 4D 2C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: AB 39 E4 7F BF 66 88 C5   05 38 60 ED D0 DF 67 98  .9...f...8`...g.
#             0010: 69 C8 06 AB 5E FC F5 14   8A 9F 1F FA FB 8F A5 01  i...^...........
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.907 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "08 35 59 90 58 D2 11 21 7F 22 78 90 2F 35 B2 E5 7F C3 F1 B2 75 25 51 8A 36 40 81 53 C4 D7 BE 84",
#   "session id"          : "F9 6A 9B ED 8E AB A4 34 51 1D F3 99 BE FE 0F C3 7D FA 9E 73 46 E7 D7 B6 5B 75 BF 46 18 BF 4D 2C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: DF 60 77 8A 4C C6 C1 F6   75 BB 7E 2F 9E 28 EA 2F  .`w.L...u../.(./
#           0010: 20 6E CF 42 29 AB A8 70   33 71 6E 09 81 74 28 35   n.B)..p3qn..t(5
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.911 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.911 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.913 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.913 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.913 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.913 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.915 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.916 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.916 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.919 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.919 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.920 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:11.930 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:11.930 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.936 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.938 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.939 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.942 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.942 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.942 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.942 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.942 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.943 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.943 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:11.943 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:11.943 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.944 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.944 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.944 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.945 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.945 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.946 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:11.946 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.958 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 03 A9 B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 14:43:51.000 UTC",
#       "not  after"         : "2024-01-16 14:43:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#           0010: E0 1D D2 63                                        ...c
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 A0 0E 22 C8 38 82 B1   55 20 D9 B2 56 1E B2 26  ...".8..U ..V..&
#           0010: 09 CE E5 88                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:11.959 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 14:44:12.057 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 14:44:12.057 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 14:44:12.058 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 14:44:12.058 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:12.089 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 44 3B 80",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 14:43:49.000 UTC",
#     "not  after"         : "2024-01-16 14:43:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E C1 FE 84 C1 C3 F4 A0   B2 F2 65 D6 E8 D9 21 E5  ..........e...!.
#         0010: 14 54 2A 61                                        .T*a
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#         0010: E0 1D D2 63                                        ...c
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:12.112 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 97 35 55 A8 F6 D3 44 04   FF 60 87 4E 57 AA 42 D0  .5U...D..`.NW.B.
#     0010: 39 9B E7 B4 14 F6 B1 6D   7F 17 C0 80 94 4F B2 5C  9......m.....O.\
#     0020: F0 29 D4 70 5D DC 90 CF   10 48 2A 08 56 F5 36 7E  .).p]....H*.V.6.
#     0030: 16 2E 46 60 FA A7 9B 7C   81 66 C5 AD 1A 46 DA 51  ..F`.....f...F.Q
#     0040: 4C A3 8A 97 13 B0 C4 B0   09 FF 37 86 2E A2 E1 54  L.........7....T
#     0050: AF 1E 32 53 EF DF 50 9E   38 46 B1 0D AD AA 78 EC  ..2S..P.8F....x.
#     0060: 7E 5B A3 FE CC BF 56 42   0C 06 70 B9 1A 7A A3 C2  .[....VB..p..z..
#     0070: 93 17 2F AB 1B 94 A0 55   A8 36 7F 5A B0 5F 07 5C  ../....U.6.Z._.\
#     0080: 7D A0 3B 6B 08 29 D7 75   3E 70 A0 9D 43 18 15 89  ..;k.).u>p..C...
#     0090: 0B D6 20 9E 00 9C B6 4E   16 91 D2 59 7C BB 4C 4B  .. ....N...Y..LK
#     00A0: BF C5 13 00 23 55 8C EC   0A 49 0B 83 38 13 0D 7F  ....#U...I..8...
#     00B0: 9C E2 2F CA 68 52 0C 68   D4 AB 09 31 4C B5 ED 70  ../.hR.h...1L..p
#     00C0: 5C 45 EA B6 AF B2 08 10   75 54 4A 3D BE 24 97 D6  \E......uTJ=.$..
#     00D0: 5E 2D B4 E1 F7 F9 ED 45   FE C9 98 80 29 B8 B5 56  ^-.....E....)..V
#     00E0: 0B C5 02 3D DB 4C BE FE   4D 94 25 38 E3 C5 99 8C  ...=.L..M.%8....
#     00F0: 05 E8 D7 1E DE 51 86 63   52 E2 A0 29 47 09 4D 6D  .....Q.cR..)G.Mm
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:12.113 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7E D2 68 58 27 D2 49 2C   9F 3B 9F 2B D9 1A 3E 2A  ..hX'.I,.;.+..>*
#     0010: B4 9E 5A 54 25 46 98 57   5A 14 C6 7F 87 C0 3D 88  ..ZT%F.WZ.....=.
#     0020: BE 66 74 6A 3F 93 79 7A   C5 0A FA 3E 80 9E 81 BB  .ftj?.yz...>....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:12.119 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 14:44:12.120 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:12.121 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 14:44:12.121 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:12.121 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 14:44:12.121 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:12.121 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:12.121 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:12.128 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 58 7D 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 14:43:56.000 UTC",
#       "not  after"         : "2024-01-16 14:43:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#           0010: E0 1D D2 63                                        ...c
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 FA 2B 91 67 A8 B2 C0   3B 7F 92 BA C8 F2 7E 71  ..+.g...;......q
#           0010: A9 6C 1E 0B                                        .l..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 44 3B 80",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 14:43:49.000 UTC",
#       "not  after"         : "2024-01-16 14:43:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E C1 FE 84 C1 C3 F4 A0   B2 F2 65 D6 E8 D9 21 E5  ..........e...!.
#           0010: 14 54 2A 61                                        .T*a
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#           0010: E0 1D D2 63                                        ...c
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:12.175 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 07 01 55 40 46 A6 23 9C   1F 6A 97 E0 A0 A6 21 18  ..U@F.#..j....!.
#     0010: F5 9D 48 E6 0C 14 40 1D   F2 49 B3 9B 02 0F C1 87  ..H...@..I......
#     0020: 8C 8D 25 76 2D 61 17 97   F3 CF 46 85 B4 85 3A 4F  ..%v-a....F...:O
#     0030: 76 D7 F9 84 A6 B3 2C B2   D5 76 7F D7 80 A9 AD 13  v.....,..v......
#     0040: A8 2A 4F 56 00 1C C2 26   EE F5 F1 57 7B 23 01 D9  .*OV...&...W.#..
#     0050: 21 4E 29 5E 5C E6 21 27   A4 0F 2F 99 02 C1 C8 E3  !N)^\.!'../.....
#     0060: 6A EC 12 02 9D 7C 94 65   A8 5A 56 81 95 32 A8 DD  j......e.ZV..2..
#     0070: 4C AD 02 34 AA 8D 91 1F   D9 3D 35 EE 68 55 2E B9  L..4.....=5.hU..
#     0080: 2C 64 3F 1F 50 E2 66 45   B0 FE A7 FD B6 97 DF 77  ,d?.P.fE.......w
#     0090: 68 4C 11 A0 BB F6 E9 E9   9E 1C 88 D0 F9 21 9D 78  hL...........!.x
#     00A0: 56 52 21 D5 4E 5A 7A 13   A9 0C C1 DF 6F 6B FC 6E  VR!.NZz.....ok.n
#     00B0: 8A DA FF 48 52 D4 77 B5   81 9B 9D 87 C7 37 D9 BA  ...HR.w......7..
#     00C0: E6 67 EE 7E 1A 1F EE CF   65 19 24 9E 07 97 5F 85  .g......e.$..._.
#     00D0: B5 EA 11 85 17 8C 81 6B   75 F8 CA 1D 16 B8 7D 63  .......ku......c
#     00E0: 2C 55 F3 D6 58 1A C5 E0   79 AA 66 0D 78 6C 20 FD  ,U..X...y.f.xl .
#     00F0: C7 BD 03 9B 2D 86 C6 D5   E5 3D 98 BD B3 EE B5 25  ....-....=.....%
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:12.179 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3B CB D4 21 3B F9 FA AD   01 ED 05 83 91 0A 3E E0  ;..!;.........>.
#     0010: 69 28 A8 97 15 9F 66 7A   4A 49 07 9F AA 1A 26 5B  i(....fzJI....&[
#     0020: 17 B4 4F 3D 83 A7 1B 9F   85 01 42 2C E2 51 78 13  ..O=......B,.Qx.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:12.185 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:12.479 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "01 E2 9D 6A 32 29 7C 10 D5 16 07 0A 10 F5 B2 B9 4A 8F AE 7D EC EA 59 69 79 3A 74 6C 1D 2D 2F 25",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 14:44:13.012 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|0E|h2sc-1-thread-2|2023-10-18 14:44:13.021 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-18 14:44:13.037 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-18 14:44:14.349; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 14:44:14.354; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 14:44:14.728; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-Z4eOab/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Z4eOab/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 14:44:14.731; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-Z4eOab/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Z4eOab/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 14:44:14.731; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-Z4eOab/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Z4eOab/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 14:44:14.763 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 58 7D 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 14:43:56.000 UTC",
#     "not  after"         : "2024-01-16 14:43:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#         0010: E0 1D D2 63                                        ...c
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 FA 2B 91 67 A8 B2 C0   3B 7F 92 BA C8 F2 7E 71  ..+.g...;......q
#         0010: A9 6C 1E 0B                                        .l..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 44 3B 80",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 14:43:49.000 UTC",
#     "not  after"         : "2024-01-16 14:43:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E C1 FE 84 C1 C3 F4 A0   B2 F2 65 D6 E8 D9 21 E5  ..........e...!.
#         0010: 14 54 2A 61                                        .T*a
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#         0010: E0 1D D2 63                                        ...c
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 14:44:14.892 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C D9 80 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 14:43:47.000 UTC",
#     "not  after"         : "2024-01-16 14:43:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E C1 FE 84 C1 C3 F4 A0   B2 F2 65 D6 E8 D9 21 E5  ..........e...!.
#         0010: 14 54 2A 61                                        .T*a
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 44 3B 80",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 14:43:49.000 UTC",
#     "not  after"         : "2024-01-16 14:43:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E C1 FE 84 C1 C3 F4 A0   B2 F2 65 D6 E8 D9 21 E5  ..........e...!.
#         0010: 14 54 2A 61                                        .T*a
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#         0010: E0 1D D2 63                                        ...c
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 14:44:14.904 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 14:44:15.091 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:15.091 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 14:44:15.093 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 14:44:15.093 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:15.097 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:15.113 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:15.113 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:15.113 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:15.115 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A8 00 EC F5 6C DF 92 56 41 EE 78 F2 1F 8A D8 7D 70 BD F6 90 43 42 37 A9 FA 9C 77 36 4D F4 E5 3A",
#   "session id"          : "3F 1A C5 1C EB 47 07 59 88 0D 14 22 C1 B3 9C 38 4F FD 8E E5 05 F6 16 4D D7 18 F7 91 66 64 1B E5",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2B 52 FA B8 07 CC 82 45   9B 10 6A E2 AC 43 A9 C3  +R.....E..j..C..
#             0010: A6 8C 46 D2 F3 0F 23 F5   CB 66 41 B3 A8 C7 7A 3A  ..F...#..fA...z:
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.232 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8A 70 2E C8 37 9B D8 EA E5 A2 50 B8 55 19 7E 3A 56 87 AF 80 2D 63 72 66 EC B4 6A A5 EF EC 05 9E",
#   "session id"          : "3F 1A C5 1C EB 47 07 59 88 0D 14 22 C1 B3 9C 38 4F FD 8E E5 05 F6 16 4D D7 18 F7 91 66 64 1B E5",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 59 0E DE 98 96 3B CC A5   1F 97 6F 66 6F FA CE 15  Y....;....ofo...
#           0010: 19 57 9C 4B 3A EE 26 67   48 20 8F C6 C7 74 9F 38  .W.K:.&gH ...t.8
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.232 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.233 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.233 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.234 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.234 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.234 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.235 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.235 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.235 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.235 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.242 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.249 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.249 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.249 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.250 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.250 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.251 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.251 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.251 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.251 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:15.251 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:15.251 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.252 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.252 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.283 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.285 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.297 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.302 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.302 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.302 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.304 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.304 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.305 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:15.305 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:15.305 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.306 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.306 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.306 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.306 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.307 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.307 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:15.308 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.310 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 03 A9 B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 14:43:51.000 UTC",
#       "not  after"         : "2024-01-16 14:43:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#           0010: E0 1D D2 63                                        ...c
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 A0 0E 22 C8 38 82 B1   55 20 D9 B2 56 1E B2 26  ...".8..U ..V..&
#           0010: 09 CE E5 88                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.310 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.519 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 44 3B 80",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 14:43:49.000 UTC",
#     "not  after"         : "2024-01-16 14:43:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E C1 FE 84 C1 C3 F4 A0   B2 F2 65 D6 E8 D9 21 E5  ..........e...!.
#         0010: 14 54 2A 61                                        .T*a
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#         0010: E0 1D D2 63                                        ...c
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.522 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5B 6A 5D EE 7E D7 A6 79   27 D2 3C 2C D5 38 7E B7  [j]....y'.<,.8..
#     0010: 90 DE 57 0F 40 10 A0 9F   05 78 F9 0F 07 96 C5 A0  ..W.@....x......
#     0020: 12 C8 74 7B DA 7F 9D B5   44 D9 C6 7F FC 51 D7 8C  ..t.....D....Q..
#     0030: C0 4B AB CE 8B 2E BB 7C   72 BF 6B EA 53 BB D9 90  .K......r.k.S...
#     0040: D4 09 A9 98 03 08 05 40   EE 24 83 4F F6 67 C6 6D  .......@.$.O.g.m
#     0050: 59 79 24 AE 0C EC AB F1   6D 13 BB 6B DD 96 A6 CB  Yy$.....m..k....
#     0060: 7E DE F6 B0 61 2F 85 25   28 77 02 61 A5 0D 61 6E  ....a/.%(w.a..an
#     0070: 45 4B 4F 87 84 CF 5C 4E   3F F8 BD 3E A6 F5 72 30  EKO...\N?..>..r0
#     0080: 02 67 ED 6E A0 BF B1 8F   9A E7 C9 56 E7 8B FE D3  .g.n.......V....
#     0090: 53 67 B6 05 3B 3F 00 5F   87 79 7A 9C 30 B1 11 EE  Sg..;?._.yz.0...
#     00A0: DE 6D 5E 95 0D 59 6F 97   EF E8 42 05 0A B9 20 00  .m^..Yo...B... .
#     00B0: AE 60 BE 9B 81 63 76 7E   7B 66 E2 AC 76 E0 DE 4E  .`...cv..f..v..N
#     00C0: 1F 67 30 39 C3 A8 91 6D   95 6F B0 45 E8 F0 6E 15  .g09...m.o.E..n.
#     00D0: 43 44 6E 9B 53 17 19 C7   D3 C6 B5 73 D7 80 C3 0B  CDn.S......s....
#     00E0: F9 4E 4E B9 EC 42 04 5C   63 04 D1 44 23 89 C1 42  .NN..B.\c..D#..B
#     00F0: 98 0D 21 71 B9 DE 01 8C   7A 9E E1 E3 6C E1 12 F1  ..!q....z...l...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.524 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 50 26 F1 92 52 3B 25 5E   11 C7 2B 1F F0 53 F5 63  P&..R;%^..+..S.c
#     0010: 10 5D 1E 4F 2A 19 8A 01   9B 04 56 C5 92 73 6C 4A  .].O*.....V..slJ
#     0020: 81 DF 73 BD 29 4D D0 00   D7 07 F5 11 09 91 C4 0B  ..s.)M..........
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.525 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 14:44:15.526 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:15.526 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 14:44:15.526 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:15.526 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 14:44:15.526 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:15.526 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.527 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.529 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 58 7D 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 14:43:56.000 UTC",
#       "not  after"         : "2024-01-16 14:43:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#           0010: E0 1D D2 63                                        ...c
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 FA 2B 91 67 A8 B2 C0   3B 7F 92 BA C8 F2 7E 71  ..+.g...;......q
#           0010: A9 6C 1E 0B                                        .l..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 44 3B 80",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 14:43:49.000 UTC",
#       "not  after"         : "2024-01-16 14:43:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E C1 FE 84 C1 C3 F4 A0   B2 F2 65 D6 E8 D9 21 E5  ..........e...!.
#           0010: 14 54 2A 61                                        .T*a
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#           0010: E0 1D D2 63                                        ...c
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.553 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 89 FA CA AB B0 45 ED FE   9E 20 87 8B 54 8D 9A 00  .....E... ..T...
#     0010: D1 70 8C 30 3E 6A 7E 9F   74 84 83 7F AF F0 BC C3  .p.0>j..t.......
#     0020: 4D CA DD E4 7F E1 73 DF   16 E1 33 34 7D 55 D5 AD  M.....s...34.U..
#     0030: 5B 93 F0 D2 39 F3 07 73   E4 09 38 06 B5 F7 79 37  [...9..s..8...y7
#     0040: CE 93 EA 63 99 5B B3 14   DD 9A 4E 8A EE 03 2B 9F  ...c.[....N...+.
#     0050: C7 AB 3E 44 8A D4 9D AB   7E 5D 1C D5 26 5F 49 2C  ..>D.....]..&_I,
#     0060: 57 6A CB 1B D2 6A AF FD   01 CE DE FF CD 92 AF 71  Wj...j.........q
#     0070: 4C A8 13 B8 78 77 71 53   0B 9B 6E E6 26 A3 D2 E4  L...xwqS..n.&...
#     0080: 87 F6 2B 65 02 82 09 F7   DD F4 2F 16 8B 39 C4 23  ..+e....../..9.#
#     0090: 03 70 82 BD 95 1F 5E 05   BA 0F BA 2D C4 5D F2 ED  .p....^....-.]..
#     00A0: EA 60 E5 D1 BD 3D 4C 66   2C C4 78 EC 13 5F BA 81  .`...=Lf,.x.._..
#     00B0: 1F 72 76 37 53 A6 B3 CA   E5 82 38 44 08 41 4D C2  .rv7S.....8D.AM.
#     00C0: 47 8D 1A FE A4 52 F5 BF   F2 C9 62 F9 26 A6 C4 19  G....R....b.&...
#     00D0: B8 E1 2A FC 6E 99 C9 EE   C5 6C 8B B7 D7 E5 D4 6D  ..*.n....l.....m
#     00E0: 8A E8 6B 7A 6E B6 DE 32   60 19 67 AC E2 62 1C 78  ..kzn..2`.g..b.x
#     00F0: D1 67 09 AE A0 4D 61 C5   E2 00 6C 29 16 76 F3 90  .g...Ma...l).v..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.554 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 16 78 96 D8 34 AB 8C A9   FC 6F 7A DF F2 43 77 C0  .x..4....oz..Cw.
#     0010: 7F ED 75 5C A2 98 EE AB   76 76 99 6A 49 F8 BB DD  ..u\....vv.jI...
#     0020: 27 FB 6C 11 69 B0 BC A6   9E 77 08 3D DC 97 B7 24  '.l.i....w.=...$
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.554 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:15.626 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9F FB F2 F0 28 BC 55 FF BA 06 81 EF D7 CA 29 06 26 4B A4 CC AA 6A 1D 62 AC E0 9C 37 F8 F8 FF F4",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 14:44:15.854 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 14:44:15.855 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-18 14:44:28.814; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 14:44:29.185 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C D9 80 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 14:43:47.000 UTC",
#       "not  after"         : "2024-01-16 14:43:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E C1 FE 84 C1 C3 F4 A0   B2 F2 65 D6 E8 D9 21 E5  ..........e...!.
#           0010: 14 54 2A 61                                        .T*a
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 44 3B 80",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 14:43:49.000 UTC",
#       "not  after"         : "2024-01-16 14:43:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E C1 FE 84 C1 C3 F4 A0   B2 F2 65 D6 E8 D9 21 E5  ..........e...!.
#           0010: 14 54 2A 61                                        .T*a
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 50 8D 56 30 43 74 C8   28 14 F6 2C FD 72 C3 37  .P.V0Ct.(..,.r.7
#           0010: E0 1D D2 63                                        ...c
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 14:44:29.198 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 14:44:29.363 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:29.363 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 14:44:29.364 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 14:44:29.365 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:29.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:29.381 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:29.381 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:29.381 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 14:44:29.383 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "D7 93 68 92 12 1B 28 8B 7B 50 92 AB F7 BE 0F 8B 99 4B 91 8D F5 72 7F D6 BC 71 17 C6 17 A5 6C 48",
#     "session id"          : "07 34 3C 8F 7D A8 4D 20 85 E7 37 52 26 1A 12 DF 78 59 FA CC C3 F9 30 FA 5F 93 2F 89 D4 00 73 D9",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 6E 44 16 E7 D2 57 6E 89   67 6E 32 FC 70 D4 DA E7  nD...Wn.gn2.p...
#               0010: C8 38 0C 86 14 5A F9 21   D8 99 2B 06 E8 41 08 36  .8...Z.!..+..A.6
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.409 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "9F 76 FC CA 95 49 D2 74 60 C6 83 48 79 DC 29 52 B0 72 DF 56 B0 84 86 F5 7F 5B BE 76 19 33 73 83",
#     "session id"          : "07 34 3C 8F 7D A8 4D 20 85 E7 37 52 26 1A 12 DF 78 59 FA CC C3 F9 30 FA 5F 93 2F 89 D4 00 73 D9",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: E1 91 F6 36 D5 D5 58 BC   8D 4C 48 E1 5B E9 DC 98  ...6..X..LH.[...
#             0010: 86 69 3C 1F B0 69 DB FA   23 C8 C9 A5 42 45 6F 6A  .i<..i..#...BEoj
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.410 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.410 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.410 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.411 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.411 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.411 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.411 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.411 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.411 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.411 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.413 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.413 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.414 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.414 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.414 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.414 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.414 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.414 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.414 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.415 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:29.415 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:44:29.415 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.415 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.415 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.422 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.423 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.426 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.430 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.430 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.430 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 14:44:29.430 UTC|SSLExtensions.java:192|Consumed extension: su

[...truncated too long message...]

ath to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 14:45:45.415 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40900/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14770ms
ok 65 stop command for single port in 17603ms
not ok 66 status detects locally running solr in 1463ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 246ms
ok 68 listing out files in 2989ms
ok 69 copying files around in 6715ms
ok 70 upconfig in 2711ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1245ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1246ms
not ok 73 Cleanup in 2545ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 30s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/2m4ucsqn2qfwq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 852 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/852/

All tests passed

Build Log:
[...truncated 1166 lines...]
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-18 12:18:56.941; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 12:18:56.993; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 3433ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-18 12:18:59.580; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 12:19:00.757; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 3414ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-18 12:19:03.044; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 12:19:04.196; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2301ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-18 12:19:06.469; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 12:19:06.521; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 24193ms
ok 19 Check export command in 22258ms
ok 20 export fails on non cloud mode in 10117ms
ok 21 using curl to extract a single pdf file in 16524ms
ok 22 using the bin/solr post tool to extract content from pdf in 17314ms
ok 23 using the bin/solr post tool to crawl web site in 20894ms
ok 24 healthcheck on cloud solr in 30270ms
ok 25 start help flag prints help in 172ms
ok 26 stop help flag prints help in 167ms
ok 27 restart help flag prints help in 169ms
ok 28 status help flag prints help in 52ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 169ms
ok 30 create help flag prints help in 160ms
ok 31 createcore help flag prints help in 163ms
ok 32 createcollection help flag prints help in 166ms
ok 33 delete help flag prints help in 161ms
ok 34 version help flag prints help in 52ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 176ms
ok 36 auth help flag prints help in 174ms
ok 37 assert help flag prints help in 928ms
ok 38 post help flag prints help in 944ms
ok 39 SQL Module in 17587ms
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 23452ms
ok 41 icu collation in analysis-extras module in 13100ms
not ok 42 package detects no running solr in 1251ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 1492 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 1492 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9777ms
ok 44 deploying and undeploying a collection level package in 13421ms
ok 45 Affinity placement plugin using sysprop in 18928ms
ok 46 Random placement plugin using ENV in 16557ms
ok 47 Check help command in 3788ms
ok 48 basic post with a type specified in 6058ms
ok 49 basic post WITHOUT a type specified in 11868ms
ok 50 crawling a directory in 4429ms
ok 51 crawling a web site in 4595ms
ok 52 commit and optimize and delete in 3984ms
ok 53 args mode in 6355ms
ok 54 stdin mode in 3352ms
ok 55 post solr log into solr via script in 9747ms
ok 56 post solr log into solr via cli in 7013ms
ok 57 allowPaths - backup in 16467ms
ok 58 start solr with ssl in 18279ms
ok 59 use different hostname when not checking peer-name in 30424ms
ok 60 start solr with ssl and auth in 16059ms
ok 61 start solr with client truststore and security manager in 19123ms
ok 62 start solr with mTLS needed in 60990ms
ok 63 start solr with mTLS wanted in 47993ms
ok 64 SOLR-11740 check 'solr stop' connection in 14714ms
ok 65 stop command for single port in 17293ms
not ok 66 status detects locally running solr in 2500ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1126 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1126 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 244ms
ok 68 listing out files in 4865ms
ok 69 copying files around in 13044ms
ok 70 upconfig in 2733ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1225ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1217ms
not ok 73 Cleanup in 3508ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1126 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1126 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 6s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/siozlu72ng25o

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 851 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/851/

1 tests failed.
FAILED:  org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([D1FCD5A3682016B8:E66721BD50ECCB1C]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.renewDelegationToken(TestSolrCloudWithDelegationTokens.java:136)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.verifyDelegationTokenRenew(TestSolrCloudWithDelegationTokens.java:346)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew(TestSolrCloudWithDelegationTokens.java:365)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1780 lines...]
# ERROR: Error from server at http://localhost:35653/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=javabin&version=2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 46 Random placement plugin using ENV in 16556ms
ok 47 Check help command in 4867ms
ok 48 basic post with a type specified in 5998ms
ok 49 basic post WITHOUT a type specified in 12441ms
ok 50 crawling a directory in 4940ms
ok 51 crawling a web site in 5132ms
ok 52 commit and optimize and delete in 4053ms
ok 53 args mode in 6629ms
ok 54 stdin mode in 3422ms
ok 55 post solr log into solr via script in 10312ms
ok 56 post solr log into solr via cli in 7233ms
ok 57 allowPaths - backup in 16697ms
ok 58 start solr with ssl in 18962ms
not ok 59 use different hostname when not checking peer-name in 20702ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 35653 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35653 (pid=1477918). Happy searching!
#
#     INFO  - 2023-10-18 10:15:14.057; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 10:15:14.060; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 10:15:14.574; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-hZ635K/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-hZ635K/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 10:15:14.657; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-hZ635K/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-hZ635K/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 10:15:14.658; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-hZ635K/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-hZ635K/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-18 10:15:24.630; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-18 10:15:24.635; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-18 10:15:24.999; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@7fd4acee[provider=null,keyStore=file:///tmp/bats-run-hZ635K/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-hZ635K/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:35653/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 10:15:26.367; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 10:15:26.371; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 10:15:27.191; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 10:15:27.238; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 17945ms
ok 61 start solr with client truststore and security manager in 19859ms
not ok 62 start solr with mTLS needed in 52755ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-hZ635K/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35653 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35653 (pid=1480683). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35654 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35654 (pid=1480793). Happy searching!
#
#     INFO  - 2023-10-18 10:16:30.167; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 10:16:30.173; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 10:16:31.414; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-hZ635K/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hZ635K/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 10:16:31.416; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-hZ635K/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hZ635K/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 10:16:31.418; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-hZ635K/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hZ635K/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 10:16:31.525 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6B A3 1E 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 10:16:17.000 UTC",
#     "not  after"         : "2024-01-16 10:16:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#         0010: 53 B6 6C 61                                        S.la
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE C7 C9 86 6B 66 3E DB   B2 AB AE 89 94 BD F5 F9  ....kf>.........
#         0010: 47 9A CB 38                                        G..8
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B FF C1 03",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 10:16:10.000 UTC",
#     "not  after"         : "2024-01-16 10:16:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 0C 26 BA B3 34 7B EA   41 D4 56 FD 6F D0 8C 0E  ..&..4..A.V.o...
#         0010: C1 46 79 08                                        .Fy.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#         0010: 53 B6 6C 61                                        S.la
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 10:16:31.533 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 A6 6A CD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 10:16:08.000 UTC",
#     "not  after"         : "2024-01-16 10:16:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 0C 26 BA B3 34 7B EA   41 D4 56 FD 6F D0 8C 0E  ..&..4..A.V.o...
#         0010: C1 46 79 08                                        .Fy.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B FF C1 03",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 10:16:10.000 UTC",
#     "not  after"         : "2024-01-16 10:16:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 0C 26 BA B3 34 7B EA   41 D4 56 FD 6F D0 8C 0E  ..&..4..A.V.o...
#         0010: C1 46 79 08                                        .Fy.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#         0010: 53 B6 6C 61                                        S.la
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 10:16:31.566 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 10:16:31.859 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:31.860 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 10:16:31.861 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 10:16:31.862 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:32.045 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:32.068 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:32.069 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:32.069 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:32.071 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F1 A0 50 E6 9E D4 40 C2 B9 2D 75 2C EC 23 76 FA DD BE A6 AA 40 CF 7D 0A 81 AA BA 6C 07 DF E3 12",
#   "session id"          : "62 9E 5F F1 F5 90 50 B7 29 1F E7 B1 3D E8 C1 D7 03 10 0F F9 BB 35 7A E7 96 2A 21 E8 02 A5 E8 D5",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: AA 3F A7 95 FC AF 40 41   1E B2 D0 CB F1 54 71 91  .?....@A.....Tq.
#             0010: C1 B0 84 1A 2E CC 45 ED   B5 60 53 AB A1 4A 7A 7B  ......E..`S..Jz.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.239 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "37 2C B7 CE 1E 73 91 B6 7C 3C 3E D5 21 04 EA CD 6A 2E F3 5B F0 5E 51 37 57 58 D1 6E 4A 45 9E A1",
#   "session id"          : "62 9E 5F F1 F5 90 50 B7 29 1F E7 B1 3D E8 C1 D7 03 10 0F F9 BB 35 7A E7 96 2A 21 E8 02 A5 E8 D5",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FC F1 E3 7A 45 CD 08 60   3B 61 3A 2A CE 03 F7 1B  ...zE..`;a:*....
#           0010: CE 5B A6 56 2A 94 A1 6B   1E FE 3F 67 2A 3E D4 7A  .[.V*..k..?g*>.z
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.239 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.240 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.246 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.246 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.246 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.248 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.248 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.248 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.248 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.248 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.248 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.248 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.525 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.527 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:32.527 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:32.527 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.527 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.527 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.544 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.545 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.547 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.550 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.550 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.550 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.557 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.558 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.558 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.558 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:32.558 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:32.558 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.559 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.560 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.560 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.560 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.561 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.562 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:32.562 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.577 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A 9C 34 C7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 10:16:12.000 UTC",
#       "not  after"         : "2024-01-16 10:16:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#           0010: 53 B6 6C 61                                        S.la
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2C 65 E5 B8 3C B0 EC 08   B1 DD 81 D6 79 08 E6 F7  ,e..<.......y...
#           0010: 0A A5 29 A5                                        ..).
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.577 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 10:16:32.654 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 10:16:32.655 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 10:16:32.655 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 10:16:32.655 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.712 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B FF C1 03",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 10:16:10.000 UTC",
#     "not  after"         : "2024-01-16 10:16:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 0C 26 BA B3 34 7B EA   41 D4 56 FD 6F D0 8C 0E  ..&..4..A.V.o...
#         0010: C1 46 79 08                                        .Fy.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#         0010: 53 B6 6C 61                                        S.la
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.716 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 96 50 A6 C3 73 15 16 7B   66 65 08 EF 7A C1 59 C8  .P..s...fe..z.Y.
#     0010: B9 6C F7 41 9B ED 40 43   CD D6 A1 05 73 BC C0 F1  .l.A..@C....s...
#     0020: 73 89 3E E1 1B E5 9D 0A   4F 03 55 EA 2E A2 3E 8C  s.>.....O.U...>.
#     0030: 31 88 B5 B5 DF 9F 22 3A   AD E8 B6 99 E1 13 01 B3  1.....":........
#     0040: 98 CF 23 80 78 87 C9 F3   7B D5 C5 10 C2 67 E9 33  ..#.x........g.3
#     0050: 9C EE BC 2E CC 39 9D 4D   9E B7 38 82 EB 25 3F 95  .....9.M..8..%?.
#     0060: FF 7E B6 70 B6 3A EC 47   E3 13 DB EC AE 2E 82 DD  ...p.:.G........
#     0070: 0C B8 25 05 FA 39 68 74   F3 09 44 EA AB C8 7C 94  ..%..9ht..D.....
#     0080: B4 86 50 0F 13 1A E5 4D   CD B5 CF 65 15 AF 1E EC  ..P....M...e....
#     0090: A6 76 5A 1B 91 D0 03 51   B1 83 B3 3E 95 DA 88 50  .vZ....Q...>...P
#     00A0: 33 D3 92 7E FC 45 B2 A9   46 A3 5C 45 18 1C 53 C7  3....E..F.\E..S.
#     00B0: 65 F2 29 0D 79 B7 94 C3   67 13 73 76 1E 07 B6 DA  e.).y...g.sv....
#     00C0: 9E 77 FC FB 53 FA 3B DC   9F 4C 94 C8 3E 76 06 F2  .w..S.;..L..>v..
#     00D0: D1 45 40 74 53 D8 6E 8A   FD C8 DB 6D A2 F1 FE BC  .E@tS.n....m....
#     00E0: 9C E1 8B 3A 77 EC 73 C5   BB E1 CA 5C A2 51 C9 F5  ...:w.s....\.Q..
#     00F0: 88 F5 47 20 D9 73 36 20   86 06 0B F3 3D B9 E0 B9  ..G .s6 ....=...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.718 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5A 9C 1D 4B 08 B1 7A A2   10 4D 7A 80 EE A1 2F 6A  Z..K..z..Mz.../j
#     0010: D9 87 C6 21 EA BD 25 1F   74 E9 26 00 79 AE 0F 24  ...!..%.t.&.y..$
#     0020: C3 24 88 8F 4E ED 5E D1   81 77 09 56 91 AF 3D 24  .$..N.^..w.V..=$
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.734 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 10:16:32.736 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:32.736 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 10:16:32.736 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:32.736 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 10:16:32.736 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:32.736 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.737 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.739 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6B A3 1E 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 10:16:17.000 UTC",
#       "not  after"         : "2024-01-16 10:16:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#           0010: 53 B6 6C 61                                        S.la
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EE C7 C9 86 6B 66 3E DB   B2 AB AE 89 94 BD F5 F9  ....kf>.........
#           0010: 47 9A CB 38                                        G..8
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B FF C1 03",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 10:16:10.000 UTC",
#       "not  after"         : "2024-01-16 10:16:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 0C 26 BA B3 34 7B EA   41 D4 56 FD 6F D0 8C 0E  ..&..4..A.V.o...
#           0010: C1 46 79 08                                        .Fy.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#           0010: 53 B6 6C 61                                        S.la
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.789 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 65 09 29 21 E2 F4 32 B6   63 01 F4 0B C7 48 26 63  e.)!..2.c....H&c
#     0010: 7A EF AD C9 D0 39 A2 85   51 26 CD F2 4C 2C 3E DF  z....9..Q&..L,>.
#     0020: 20 DF EA D5 61 C3 86 C4   36 C4 7F CE DB 45 04 72   ...a...6....E.r
#     0030: 9B 0A B6 A8 B8 D0 16 66   7D E0 08 A6 1B 75 E5 49  .......f.....u.I
#     0040: 03 80 CF 46 6F FA 22 1D   53 61 5E 47 14 C5 06 79  ...Fo.".Sa^G...y
#     0050: 6B 28 0C 28 C1 DA AC 9D   51 79 EC C0 83 08 D3 D8  k(.(....Qy......
#     0060: D9 AA C9 47 1A A8 BA 37   D1 65 6C C4 AC AD 4A 6F  ...G...7.el...Jo
#     0070: 9F 8D A2 E1 36 DA 15 AA   00 56 15 97 68 38 BA DA  ....6....V..h8..
#     0080: FC 78 BA 7D 20 EA 89 E4   3D C6 1A 92 2D 29 5A 1F  .x.. ...=...-)Z.
#     0090: A8 5D 1D 6D 4E BB 6F 65   6F 9F 99 02 6E BD 7E 56  .].mN.oeo...n..V
#     00A0: 6D 51 AC 69 34 55 20 FF   EC B6 AF 6C 0B 42 D4 65  mQ.i4U ....l.B.e
#     00B0: CC BD 58 D2 5E 68 27 96   05 E6 22 B4 E1 BF 40 8E  ..X.^h'..."...@.
#     00C0: 85 81 2A 68 85 B9 F2 3B   91 BE DB CF BE 1D 42 E6  ..*h...;......B.
#     00D0: 27 A5 B3 94 B1 14 73 7F   C4 91 6C 96 35 B9 A6 3B  '.....s...l.5..;
#     00E0: 14 62 A1 3E 37 F7 87 98   0A F0 53 BC 55 11 5C D4  .b.>7.....S.U.\.
#     00F0: B2 B5 A9 70 ED D7 54 57   DD F0 BA 75 C1 74 BF DA  ...p..TW...u.t..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.790 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 69 E0 5A C3 6B A2 94 01   02 1D E1 C5 E2 C1 B8 7B  i.Z.k...........
#     0010: 8F 67 43 16 82 E8 3C 2C   2D 1A D9 48 AA F6 C3 7C  .gC...<,-..H....
#     0020: 76 3C B1 56 DC B3 B2 1B   75 19 74 66 F0 49 A5 57  v<.V....u.tf.I.W
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:32.794 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-18 10:16:32.869 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F5 76 D8 90 50 19 01 91 EA CE B8 9B 53 13 82 C0 A8 BB 89 A3 04 97 2A E8 7D 50 3E 9F 57 52 23 C4",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-18 10:16:33.452 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 10:16:33.453 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 10:16:33.454 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 10:16:35.346; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 10:16:35.350; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 10:16:35.709; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-hZ635K/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hZ635K/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 10:16:35.712; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-hZ635K/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hZ635K/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 10:16:35.714; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-hZ635K/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hZ635K/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 10:16:35.762 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6B A3 1E 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 10:16:17.000 UTC",
#     "not  after"         : "2024-01-16 10:16:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#         0010: 53 B6 6C 61                                        S.la
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE C7 C9 86 6B 66 3E DB   B2 AB AE 89 94 BD F5 F9  ....kf>.........
#         0010: 47 9A CB 38                                        G..8
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B FF C1 03",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 10:16:10.000 UTC",
#     "not  after"         : "2024-01-16 10:16:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 0C 26 BA B3 34 7B EA   41 D4 56 FD 6F D0 8C 0E  ..&..4..A.V.o...
#         0010: C1 46 79 08                                        .Fy.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#         0010: 53 B6 6C 61                                        S.la
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 10:16:35.766 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 A6 6A CD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 10:16:08.000 UTC",
#     "not  after"         : "2024-01-16 10:16:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 0C 26 BA B3 34 7B EA   41 D4 56 FD 6F D0 8C 0E  ..&..4..A.V.o...
#         0010: C1 46 79 08                                        .Fy.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B FF C1 03",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 10:16:10.000 UTC",
#     "not  after"         : "2024-01-16 10:16:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 0C 26 BA B3 34 7B EA   41 D4 56 FD 6F D0 8C 0E  ..&..4..A.V.o...
#         0010: C1 46 79 08                                        .Fy.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#         0010: 53 B6 6C 61                                        S.la
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 10:16:35.779 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 10:16:36.036 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:36.036 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 10:16:36.038 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 10:16:36.038 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:36.042 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:36.053 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:36.054 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:36.054 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:36.056 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7A 2A B4 B7 02 F0 2F EA D3 60 D4 C6 87 96 29 40 D3 85 03 DA 20 D7 3D 55 A3 F6 AC 58 C2 8C 1E 2C",
#   "session id"          : "70 C7 D5 48 7E 45 4E 6E FB 12 3B 0E 14 8B 98 6E 75 8B 23 7C 65 01 EC FE E6 CB BE 34 F7 BD EA F6",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B4 48 02 B0 AC 9F 4A 1F   D4 34 CA 96 EB B8 B3 AC  .H....J..4......
#             0010: 10 29 28 FF CF E0 2F 14   35 6B 92 69 14 72 36 70  .)(.../.5k.i.r6p
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.140 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "09 E9 3D FA EA AA 9D 10 8C FE 87 2C 0E 3F 20 34 73 FC DD E2 58 64 41 EC DB 31 67 E2 5F 33 74 4D",
#   "session id"          : "70 C7 D5 48 7E 45 4E 6E FB 12 3B 0E 14 8B 98 6E 75 8B 23 7C 65 01 EC FE E6 CB BE 34 F7 BD EA F6",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 85 CF 8E 60 0D F6 34 90   28 D1 0A 97 5B 3A CA 2F  ...`..4.(...[:./
#           0010: B4 E7 10 0B 9C B7 F2 51   24 B9 1F 29 6B 60 BA 1A  .......Q$..)k`..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.140 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.140 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.142 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.142 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.142 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.142 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.143 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.143 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.143 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.143 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.144 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.145 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.145 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.145 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.145 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.145 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.145 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.145 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.145 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:36.146 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:36.146 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.146 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.146 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.176 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.178 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.180 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.192 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.193 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.193 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.194 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.194 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.194 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.194 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:36.195 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:36.195 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.197 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.197 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.198 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.198 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.198 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.199 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:36.199 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.201 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A 9C 34 C7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 10:16:12.000 UTC",
#       "not  after"         : "2024-01-16 10:16:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#           0010: 53 B6 6C 61                                        S.la
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2C 65 E5 B8 3C B0 EC 08   B1 DD 81 D6 79 08 E6 F7  ,e..<.......y...
#           0010: 0A A5 29 A5                                        ..).
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.202 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 10:16:36.244 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 10:16:36.252 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 10:16:36.252 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 10:16:36.252 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.262 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B FF C1 03",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 10:16:10.000 UTC",
#     "not  after"         : "2024-01-16 10:16:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 0C 26 BA B3 34 7B EA   41 D4 56 FD 6F D0 8C 0E  ..&..4..A.V.o...
#         0010: C1 46 79 08                                        .Fy.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#         0010: 53 B6 6C 61                                        S.la
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.269 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 42 49 5C 78 44 45 C3 C7   B0 75 66 47 61 FA B4 EF  BI\xDE...ufGa...
#     0010: C7 0E C0 06 28 92 E1 7A   EC BA 4F EC 23 BA 04 18  ....(..z..O.#...
#     0020: 6F CD A7 4F 5D 65 01 93   4E CE 29 4C A5 A9 D3 63  o..O]e..N.)L...c
#     0030: BC 68 D7 41 33 08 A1 D5   6F 14 D4 09 2D 39 28 26  .h.A3...o...-9(&
#     0040: 02 62 D2 83 46 B2 2E 22   EB B4 DA DC FE 79 DE 5E  .b..F..".....y.^
#     0050: 7E 8D B4 DE 70 5D 93 BA   E9 75 CE 0F 2F CE 83 98  ....p]...u../...
#     0060: 86 04 E7 F0 7B B2 09 68   68 53 0C 07 6F 06 01 1F  .......hhS..o...
#     0070: 65 DA 0B 42 82 2A 59 90   DC 63 64 86 70 21 EF 0B  e..B.*Y..cd.p!..
#     0080: 99 67 43 8A FD 1F 11 F3   8D EB E2 CC DF A9 07 2B  .gC............+
#     0090: 75 7D B3 F9 7E 64 1F E0   EB 6A C5 6E E0 A9 0B 10  u....d...j.n....
#     00A0: 85 4D 1C 28 93 32 F2 57   30 D9 1E 38 74 37 EF B4  .M.(.2.W0..8t7..
#     00B0: 7A F2 4C F5 D8 3C 1B 1E   0F 4C 51 A2 2B 08 17 6B  z.L..<...LQ.+..k
#     00C0: 6A A5 B6 2F 12 74 C3 FE   7E C5 CE 01 61 2C D3 87  j../.t......a,..
#     00D0: CE DD 9D 35 27 F3 8E 49   7D 96 30 00 C5 E5 F5 45  ...5'..I..0....E
#     00E0: 08 90 8C 41 97 03 06 7F   08 51 A6 98 41 92 89 96  ...A.....Q..A...
#     00F0: 62 C8 9C 41 32 B1 FC 08   10 92 82 38 B7 4E C8 FE  b..A2......8.N..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.270 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9B C1 6A D9 24 96 2E 38   95 29 53 3D 9A 3A FA 5A  ..j.$..8.)S=.:.Z
#     0010: B6 5B 61 7A 34 AC F7 4E   83 91 C6 C7 A4 2C 91 B9  .[az4..N.....,..
#     0020: 93 98 33 FC FA 49 6C 7F   8B 97 6A C3 86 BF 92 A6  ..3..Il...j.....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.272 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 10:16:36.273 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:36.273 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 10:16:36.273 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:36.273 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 10:16:36.273 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 10:16:36.273 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.274 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.276 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6B A3 1E 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 10:16:17.000 UTC",
#       "not  after"         : "2024-01-16 10:16:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#           0010: 53 B6 6C 61                                        S.la
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EE C7 C9 86 6B 66 3E DB   B2 AB AE 89 94 BD F5 F9  ....kf>.........
#           0010: 47 9A CB 38                                        G..8
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B FF C1 03",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 10:16:10.000 UTC",
#       "not  after"         : "2024-01-16 10:16:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 0C 26 BA B3 34 7B EA   41 D4 56 FD 6F D0 8C 0E  ..&..4..A.V.o...
#           0010: C1 46 79 08                                        .Fy.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#           0010: 53 B6 6C 61                                        S.la
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.307 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 74 EA 94 E2 31 91 9D 42   F0 5D 0D 3F E8 FD 42 E1  t...1..B.].?..B.
#     0010: 0D 65 76 F7 6A C0 E9 83   48 9E 4F 03 75 01 9C 6F  .ev.j...H.O.u..o
#     0020: 93 86 4C A2 07 EE 22 40   FB 43 9B 89 FD 09 7A 4C  ..L..."@.C....zL
#     0030: D3 98 E4 A4 DD CB 4B 19   62 B1 39 C7 57 7A 86 9D  ......K.b.9.Wz..
#     0040: 8D AA 15 FD 78 94 6C 19   D1 17 A3 14 B6 69 19 C9  ....x.l......i..
#     0050: E8 B3 BC D6 AF BA 94 19   B2 F2 78 16 7B 7E E7 C7  ..........x.....
#     0060: 70 7E DF B2 C4 B4 30 BD   11 9F 38 8C C1 74 37 E4  p.....0...8..t7.
#     0070: F4 16 D0 A9 B0 36 91 9D   8A D9 0D C7 02 CC 3E 46  .....6........>F
#     0080: AD 31 F8 69 E6 5A D7 60   AD 92 3C 26 61 33 B1 45  .1.i.Z.`..<&a3.E
#     0090: 0E 18 CD 5B C0 8B 03 8D   01 9F 2E 62 15 78 3D EE  ...[.......b.x=.
#     00A0: 6E 25 DB 99 4D 87 2E CB   F6 02 55 73 AD C8 F8 81  n%..M.....Us....
#     00B0: B7 CB 7B 8C 72 F3 A2 72   BE 09 87 98 9A 04 EF 99  ....r..r........
#     00C0: 6D 28 06 18 9F 8F 84 2C   84 65 CF 1F FF 6C A7 6E  m(.....,.e...l.n
#     00D0: 81 F7 AF EA 43 3A 43 56   4C AE E7 A2 71 F3 94 4F  ....C:CVL...q..O
#     00E0: F4 2F 6B AB C4 15 A6 BB   3A 05 20 07 9F AC EF 41  ./k.....:. ....A
#     00F0: BB 7E 57 51 40 A1 DE D2   E0 75 FA 95 F3 19 BF 18  ..WQ@....u......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.308 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BC C3 1B 1E 96 3D 8C 8B   68 F1 6E 86 B5 B2 F1 4C  .....=..h.n....L
#     0010: A3 F5 00 E2 C1 9B B6 01   71 61 34 5C DB CA A8 10  ........qa4\....
#     0020: 82 24 D1 41 CC B4 5A 9B   DE 3E EE 85 67 23 71 7E  .$.A..Z..>..g#q.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.309 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 10:16:36.363 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "88 F2 6F E0 21 71 52 C4 FD 70 AA 43 AA 6E 09 D7 E1 A7 0A BE 8F F0 8E 43 78 C1 09 04 0D E8 06 72",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 10:16:36.760 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 10:16:36.766 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-18 10:16:50.399; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 10:16:50.763 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 A6 6A CD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 10:16:08.000 UTC",
#       "not  after"         : "2024-01-16 10:16:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 0C 26 BA B3 34 7B EA   41 D4 56 FD 6F D0 8C 0E  ..&..4..A.V.o...
#           0010: C1 46 79 08                                        .Fy.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B FF C1 03",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 10:16:10.000 UTC",
#       "not  after"         : "2024-01-16 10:16:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 0C 26 BA B3 34 7B EA   41 D4 56 FD 6F D0 8C 0E  ..&..4..A.V.o...
#           0010: C1 46 79 08                                        .Fy.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 A9 9A BE 23 F1 7E 6E   00 3D 6E 96 39 E3 D0 F8  u...#..n.=n.9...
#           0010: 53 B6 6C 61                                        S.la
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 10:16:50.776 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 10:16:51.049 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:51.050 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 10:16:51.051 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 10:16:51.051 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:51.056 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:51.066 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:51.067 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:51.067 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 10:16:51.069 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "96 02 65 BA 3E 4E DD 8A A7 14 33 3B FE DC 74 BC 0C 5C 5C 56 2C CD FA 75 15 DE AA AE 98 5A 0D 54",
#     "session id"          : "7E FA D4 4D 80 C4 52 A6 02 DB 48 2E 8C B7 EF F5 2C 01 79 2D 54 52 D4 EF CC F2 E7 6A 62 F7 1D ED",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: C0 A2 71 62 C5 51 F3 2D   8E EE 1D 52 FB EA 1B 32  ..qb.Q.-.

[...truncated too long message...]

.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14541ms
ok 65 stop command for single port in 17597ms
not ok 66 status detects locally running solr in 1523ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 249ms
ok 68 listing out files in 2725ms
ok 69 copying files around in 6984ms
ok 70 upconfig in 3424ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1297ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1264ms
not ok 73 Cleanup in 2545ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=D1FCD5A3682016B8 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 3m 13s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/54rbllhzqrz74

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 850 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/850/

All tests passed

Build Log:
[...truncated 1209 lines...]
# ERROR: Error from server at http://localhost:42589/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=javabin&version=2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 46 Random placement plugin using ENV in 17360ms
ok 47 Check help command in 4975ms
ok 48 basic post with a type specified in 5723ms
ok 49 basic post WITHOUT a type specified in 12003ms
ok 50 crawling a directory in 4502ms
ok 51 crawling a web site in 4932ms
ok 52 commit and optimize and delete in 3921ms
ok 53 args mode in 6521ms
ok 54 stdin mode in 3479ms
ok 55 post solr log into solr via script in 10564ms
ok 56 post solr log into solr via cli in 7260ms
ok 57 allowPaths - backup in 17244ms
ok 58 start solr with ssl in 19093ms
not ok 59 use different hostname when not checking peer-name in 20736ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 42589 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42589 (pid=1188392). Happy searching!
#
#     INFO  - 2023-10-18 07:50:24.888; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 07:50:24.893; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 07:50:25.410; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-EPeGnC/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-EPeGnC/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 07:50:25.490; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-EPeGnC/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-EPeGnC/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 07:50:25.491; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-EPeGnC/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-EPeGnC/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-18 07:50:35.371; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-18 07:50:35.375; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-18 07:50:35.759; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@6175619b[provider=null,keyStore=file:///tmp/bats-run-EPeGnC/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-EPeGnC/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:42589/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 07:50:37.269; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 07:50:37.273; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 07:50:38.057; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 07:50:38.095; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 17152ms
ok 61 start solr with client truststore and security manager in 24293ms
not ok 62 start solr with mTLS needed in 72452ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-EPeGnC/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 42589 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 42589 (pid=1191706). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 42590 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42590 (pid=1191913). Happy searching!
#
#     INFO  - 2023-10-18 07:51:56.471; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 07:51:56.486; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 07:51:57.696; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-EPeGnC/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-EPeGnC/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 07:51:57.702; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-EPeGnC/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-EPeGnC/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 07:51:57.703; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-EPeGnC/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-EPeGnC/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 07:51:57.756 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 13 20 D6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 07:51:36.000 UTC",
#     "not  after"         : "2024-01-16 07:51:36.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#         0010: 1B C3 5A FE                                        ..Z.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 68 3F 95 35 D7 D6 A4 55   84 75 67 56 09 88 04 4E  h?.5...U.ugV...N
#         0010: CD 23 A1 D5                                        .#..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 16 31 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 07:51:25.000 UTC",
#     "not  after"         : "2024-01-16 07:51:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 31 03 86 8D 41 00 56   88 46 57 0A 43 87 BD 8C  .1...A.V.FW.C...
#         0010: 38 CF 6A C6                                        8.j.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#         0010: 1B C3 5A FE                                        ..Z.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 07:51:57.760 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 16 31 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 07:51:25.000 UTC",
#     "not  after"         : "2024-01-16 07:51:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 31 03 86 8D 41 00 56   88 46 57 0A 43 87 BD 8C  .1...A.V.FW.C...
#         0010: 38 CF 6A C6                                        8.j.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#         0010: 1B C3 5A FE                                        ..Z.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 A7 B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 07:51:22.000 UTC",
#     "not  after"         : "2024-01-16 07:51:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 31 03 86 8D 41 00 56   88 46 57 0A 43 87 BD 8C  .1...A.V.FW.C...
#         0010: 38 CF 6A C6                                        8.j.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 07:51:57.782 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 07:51:58.376 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:51:58.377 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 07:51:58.382 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 07:51:58.382 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:51:58.390 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:51:58.434 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:51:58.434 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:51:58.434 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:51:58.437 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6B E5 4D A9 A3 51 5F 13 83 99 B5 72 1D 54 2F DA 12 76 E1 EE 25 1B 80 EF 76 21 2F 4C 5E C3 3C 38",
#   "session id"          : "E2 3B C4 1C 91 06 99 C4 60 80 2E A3 A6 12 5C 75 4E D6 CE D1 EB 8E 32 3C 7A 66 31 27 06 DF D6 98",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D9 2A AE 15 01 01 45 E1   26 F0 E0 72 8A E1 32 2E  .*....E.&..r..2.
#             0010: 23 79 90 04 B4 AC CC A2   55 49 46 5E 26 BB EB 5D  #y......UIF^&..]
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.842 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A9 7D 40 9C 92 EA 4B 50 06 36 C6 01 28 96 E6 DC 42 BD 13 2D C2 BB 02 6C 2F 3A B6 63 C4 45 DC FF",
#   "session id"          : "E2 3B C4 1C 91 06 99 C4 60 80 2E A3 A6 12 5C 75 4E D6 CE D1 EB 8E 32 3C 7A 66 31 27 06 DF D6 98",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 24 7F F4 39 ED DC 3C 50   A1 6D 3A 33 D7 2C CE 38  $..9..<P.m:3.,.8
#           0010: 4E F2 46 B5 3B 53 3F 7D   22 DB 30 B1 39 51 CA 05  N.F.;S?.".0.9Q..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.842 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.843 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.848 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.850 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.850 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.850 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.851 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.851 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.853 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.859 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.859 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.860 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.860 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.860 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.860 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.860 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.860 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:51:58.860 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:51:58.860 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.860 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.860 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.886 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.906 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 07:51:58.913 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 07:51:58.913 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 07:51:58.914 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 07:51:58.914 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.917 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.922 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.923 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.923 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.930 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.931 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:51:58.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:51:58.932 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.933 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.933 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.933 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.934 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.939 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.941 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:51:58.941 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.966 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "29 AB 57 BC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 07:51:29.000 UTC",
#       "not  after"         : "2024-01-16 07:51:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#           0010: 1B C3 5A FE                                        ..Z.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 B2 E5 77 91 1F C9 F8   76 A0 30 33 FB D8 A1 83  ...w....v.03....
#           0010: 4B EB E8 01                                        K...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:58.966 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:59.130 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 16 31 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 07:51:25.000 UTC",
#     "not  after"         : "2024-01-16 07:51:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 31 03 86 8D 41 00 56   88 46 57 0A 43 87 BD 8C  .1...A.V.FW.C...
#         0010: 38 CF 6A C6                                        8.j.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#         0010: 1B C3 5A FE                                        ..Z.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:59.141 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 79 7C 7A 35 C2 7B 60 01   6E C4 BD 43 20 C9 CC D2  y.z5..`.n..C ...
#     0010: C2 54 57 19 09 11 91 64   0D E7 7D 45 4E 64 7A 0E  .TW....d...ENdz.
#     0020: D7 46 B0 BF 73 37 AA BF   71 C7 07 30 E0 A3 07 87  .F..s7..q..0....
#     0030: B2 F4 BF 63 4F 2C F5 E1   38 9A A9 3F 6A 90 6C 8F  ...cO,..8..?j.l.
#     0040: 94 08 35 10 FD FE 8B FC   7B 36 A5 38 5A EC 2D 2F  ..5......6.8Z.-/
#     0050: 25 C2 C2 1A C7 92 1B 75   2D 82 EF 7E 88 39 5A 6B  %......u-....9Zk
#     0060: FE 4B 23 82 14 34 E7 46   AA F3 8A E8 18 C3 2B 75  .K#..4.F......+u
#     0070: 06 FC A3 3D 79 3F 85 96   24 59 0B C1 FA D4 CB 48  ...=y?..$Y.....H
#     0080: F4 F8 FD EB 25 98 F2 77   C8 C9 E8 3E E6 BF E4 49  ....%..w...>...I
#     0090: E4 7F F0 12 19 A1 63 4D   23 2E 7F DA E0 95 FF 88  ......cM#.......
#     00A0: 3B 05 FC A1 59 76 71 98   9C 85 D4 20 24 52 8D 33  ;...Yvq.... $R.3
#     00B0: 89 0C 7F 6F A8 2C 27 43   D2 2F 60 3A 71 38 E9 FF  ...o.,'C./`:q8..
#     00C0: 0F 29 4E FD D5 5F EB C6   22 19 21 97 80 BC 4C 33  .)N.._..".!...L3
#     00D0: 2F 36 D8 87 F6 C8 C7 4E   A5 F5 2C F5 2E 77 3B 82  /6.....N..,..w;.
#     00E0: D9 E5 C0 50 7D 05 88 5D   1D 8D 5F E3 59 18 A5 42  ...P...].._.Y..B
#     00F0: 11 42 74 E0 F4 74 83 31   21 43 4F 5F BB 60 92 B7  .Bt..t.1!CO_.`..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:59.143 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 61 CB 81 C8 52 43 BE 37   51 1D 12 3E D5 0A 2A C4  a...RC.7Q..>..*.
#     0010: 62 15 82 2E 2D 62 62 19   B9 61 84 B3 4B 17 6E 02  b...-bb..a..K.n.
#     0020: 80 9A 24 C6 50 F5 52 83   97 8B 9D 08 83 AD 7F 60  ..$.P.R........`
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:59.157 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 07:51:59.168 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:51:59.168 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 07:51:59.168 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:51:59.168 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 07:51:59.168 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:51:59.169 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:59.169 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:59.182 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 13 20 D6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 07:51:36.000 UTC",
#       "not  after"         : "2024-01-16 07:51:36.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#           0010: 1B C3 5A FE                                        ..Z.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 68 3F 95 35 D7 D6 A4 55   84 75 67 56 09 88 04 4E  h?.5...U.ugV...N
#           0010: CD 23 A1 D5                                        .#..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 16 31 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 07:51:25.000 UTC",
#       "not  after"         : "2024-01-16 07:51:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 31 03 86 8D 41 00 56   88 46 57 0A 43 87 BD 8C  .1...A.V.FW.C...
#           0010: 38 CF 6A C6                                        8.j.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#           0010: 1B C3 5A FE                                        ..Z.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:59.435 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1A F9 FA AD 7A A8 22 97   A5 E6 0F 86 A9 68 61 C6  ....z."......ha.
#     0010: 3D D5 1C B1 FD DD F5 3A   67 6F 23 B0 F9 02 35 D4  =......:go#...5.
#     0020: 77 00 83 52 CD 1C 94 D1   FB 1D 12 F5 90 4C B0 01  w..R.........L..
#     0030: 5D 45 8D A4 18 4C EA A0   E9 EA 2C 71 C4 4E D9 66  ]E...L....,q.N.f
#     0040: C3 5F 1B 2C 4F 3E 15 69   B1 82 52 49 6D 15 BB 46  ._.,O>.i..RIm..F
#     0050: 09 83 B5 59 DE 7B E8 53   35 A8 72 FD EA 6F 57 13  ...Y...S5.r..oW.
#     0060: C1 7F AB 5A 9C 37 7C 43   02 46 DA 3C 3C 93 71 CE  ...Z.7.C.F.<<.q.
#     0070: 3E 64 C4 D8 56 78 9F 93   CC FF FA 66 AA 72 33 D7  >d..Vx.....f.r3.
#     0080: 01 82 7F FD 58 A2 4D 44   F2 0F 87 5B 3A 59 B9 53  ....X.MD...[:Y.S
#     0090: BE 47 0E 91 0E 49 74 2D   78 21 4D E3 C5 1D 1E 75  .G...It-x!M....u
#     00A0: 9C C3 C6 A8 DA 4F CC 5E   D9 82 58 AB AF AC 6F FF  .....O.^..X...o.
#     00B0: 5C 5B 64 21 FF E3 FA E7   15 94 E8 1A 7C 96 F6 3B  \[d!...........;
#     00C0: 11 AD 51 2A DF 1C 02 13   92 DE 84 68 CA 30 87 AB  ..Q*.......h.0..
#     00D0: 67 32 E7 B1 93 05 73 DD   9D C7 FF 48 0E FF 50 45  g2....s....H..PE
#     00E0: AB A8 37 46 EF 0F BF AE   6D 47 2E C1 E3 6E 02 66  ..7F....mG...n.f
#     00F0: C8 F8 3B 6B 02 60 72 EB   EA 8A 70 99 51 CC 4D 64  ..;k.`r...p.Q.Md
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:59.453 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AC B4 08 20 49 64 2C DC   C3 9C 15 A1 32 1F 1E 4D  ... Id,.....2..M
#     0010: 1C 18 48 27 22 39 84 E1   4C 91 37 56 05 7E AB 88  ..H'"9..L.7V....
#     0020: BD 94 1A 5F 98 0A 47 B6   69 FA CF 02 FD 9A 58 D2  ..._..G.i.....X.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:59.454 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:51:59.583 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "19 7B 3E 38 6C 25 CC 92 4C 6E F7 82 40 1D 65 6E C8 27 CF 9C 77 C1 3F A9 00 E2 00 E3 66 E5 81 E2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 07:52:00.537 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 07:52:00.538 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 07:52:02.377; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 07:52:02.382; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 07:52:02.785; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-EPeGnC/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-EPeGnC/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 07:52:02.788; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-EPeGnC/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-EPeGnC/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 07:52:02.789; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-EPeGnC/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-EPeGnC/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 07:52:02.825 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 13 20 D6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 07:51:36.000 UTC",
#     "not  after"         : "2024-01-16 07:51:36.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#         0010: 1B C3 5A FE                                        ..Z.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 68 3F 95 35 D7 D6 A4 55   84 75 67 56 09 88 04 4E  h?.5...U.ugV...N
#         0010: CD 23 A1 D5                                        .#..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 16 31 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 07:51:25.000 UTC",
#     "not  after"         : "2024-01-16 07:51:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 31 03 86 8D 41 00 56   88 46 57 0A 43 87 BD 8C  .1...A.V.FW.C...
#         0010: 38 CF 6A C6                                        8.j.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#         0010: 1B C3 5A FE                                        ..Z.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 07:52:02.829 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 16 31 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 07:51:25.000 UTC",
#     "not  after"         : "2024-01-16 07:51:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 31 03 86 8D 41 00 56   88 46 57 0A 43 87 BD 8C  .1...A.V.FW.C...
#         0010: 38 CF 6A C6                                        8.j.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#         0010: 1B C3 5A FE                                        ..Z.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 A7 B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 07:51:22.000 UTC",
#     "not  after"         : "2024-01-16 07:51:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 31 03 86 8D 41 00 56   88 46 57 0A 43 87 BD 8C  .1...A.V.FW.C...
#         0010: 38 CF 6A C6                                        8.j.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 07:52:02.843 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 07:52:03.014 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:52:03.015 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 07:52:03.016 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 07:52:03.017 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:52:03.021 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:52:03.033 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:52:03.033 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:52:03.033 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:52:03.035 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DE E1 9B CC 20 1C CC 86 8B 74 3A E4 F3 56 AB 7B 82 67 9C 05 9D 3B 7C CE D2 11 31 35 8E CF E7 28",
#   "session id"          : "FD E3 37 8F A3 B3 1C 89 0F CE F8 50 E1 EA D1 76 D6 98 4E FC 30 80 66 05 56 AF 19 D5 94 DA 80 E9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: FA B7 C4 C5 D0 81 F8 AE   C2 47 87 EB 93 48 43 01  .........G...HC.
#             0010: CA 85 89 2E 50 04 22 56   CA BA E2 24 B7 BD 10 5E  ....P."V...$...^
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.439 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F2 4A CA 6C E0 F6 62 C6 53 E6 49 22 1D 12 A5 2B 39 EE 18 83 D9 3F B7 2F 9A 50 EE BD 3B E8 F2 E6",
#   "session id"          : "FD E3 37 8F A3 B3 1C 89 0F CE F8 50 E1 EA D1 76 D6 98 4E FC 30 80 66 05 56 AF 19 D5 94 DA 80 E9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 8C 25 EB D7 B4 EF C7 3A   1B 84 53 DB 99 15 77 C4  .%.....:..S...w.
#           0010: 9E 00 F4 D4 5E 85 DC B4   46 B5 19 BC 8F 31 07 3F  ....^...F....1.?
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.439 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.440 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.441 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.441 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.441 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.441 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.441 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.446 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.446 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.446 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.446 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.446 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.446 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.446 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:52:03.447 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:52:03.447 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.463 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.467 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.469 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.478 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.478 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.478 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.478 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.479 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.479 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.479 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:52:03.479 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:52:03.479 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.480 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.480 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.480 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.481 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.481 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.482 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:52:03.482 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.495 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "29 AB 57 BC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 07:51:29.000 UTC",
#       "not  after"         : "2024-01-16 07:51:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#           0010: 1B C3 5A FE                                        ..Z.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 B2 E5 77 91 1F C9 F8   76 A0 30 33 FB D8 A1 83  ...w....v.03....
#           0010: 4B EB E8 01                                        K...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.498 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 07:52:03.589 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 07:52:03.589 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 07:52:03.589 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 07:52:03.589 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.632 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 16 31 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 07:51:25.000 UTC",
#     "not  after"         : "2024-01-16 07:51:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 31 03 86 8D 41 00 56   88 46 57 0A 43 87 BD 8C  .1...A.V.FW.C...
#         0010: 38 CF 6A C6                                        8.j.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#         0010: 1B C3 5A FE                                        ..Z.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.635 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 33 FB 58 99 C3 AC 92 69   1D 21 74 FC 25 40 69 C3  3.X....i.!t.%@i.
#     0010: 48 BD 02 D5 0D 63 7A DC   8A A1 4B A1 4A 0F 79 AF  H....cz...K.J.y.
#     0020: 52 37 53 DD 18 2A 97 05   FE 02 E4 E5 AC 9C 65 29  R7S..*........e)
#     0030: 7C DF C5 F3 5D 8F E6 F8   A8 F3 84 9E 4F C9 3C 34  ....].......O.<4
#     0040: C3 B7 6C 67 66 26 24 40   5C 7A A9 84 84 21 F1 1E  ..lgf&$@\z...!..
#     0050: 66 35 6A 64 B5 3B 46 5C   2B 25 F8 10 12 3C F8 FE  f5jd.;F\+%...<..
#     0060: 8B 29 8F D5 29 91 F4 DB   C6 5F E6 71 7E 58 67 B3  .)..)...._.q.Xg.
#     0070: 23 9F 70 93 F3 F4 5C AB   57 0F 85 45 CD B5 8B DE  #.p...\.W..E....
#     0080: E3 ED 70 8B BD 6E 12 1B   A7 6B AF E5 E0 52 90 7F  ..p..n...k...R..
#     0090: E9 BB 87 18 CC 1C BE 0D   C8 84 2B 37 27 1B 9B 2B  ..........+7'..+
#     00A0: 7A 11 0E EF D1 E2 02 EF   48 99 8B 63 6D 67 8B 8D  z.......H..cmg..
#     00B0: 51 F6 55 FD 4B 67 ED 54   98 1F D7 88 4B 59 D4 F4  Q.U.Kg.T....KY..
#     00C0: 6B 93 0E 60 A4 D9 B1 2D   5E 82 60 99 90 15 33 E0  k..`...-^.`...3.
#     00D0: 91 EE 5A C6 9A 15 25 B6   B8 F4 95 14 82 BA EE 1F  ..Z...%.........
#     00E0: 7E 18 88 B4 6B 1D 37 0E   FD 1C D3 5B 77 7B 37 D1  ....k.7....[w.7.
#     00F0: BC 26 D2 3B 6A 45 57 EB   4A 78 C9 DD CB 14 4C 9B  .&.;jEW.Jx....L.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.636 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5A 17 A6 EE 1C D6 EF A4   81 0F 7C 09 57 5B 0F 28  Z...........W[.(
#     0010: 97 9D 26 50 41 2C 28 AF   8D B9 61 80 B3 B7 A8 9D  ..&PA,(...a.....
#     0020: EE E6 39 4F DF A4 17 DB   B3 A9 7C 19 C2 B6 C8 9B  ..9O............
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.638 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 07:52:03.639 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:52:03.639 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 07:52:03.639 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:52:03.639 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 07:52:03.639 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:52:03.639 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.640 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.642 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 13 20 D6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 07:51:36.000 UTC",
#       "not  after"         : "2024-01-16 07:51:36.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#           0010: 1B C3 5A FE                                        ..Z.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 68 3F 95 35 D7 D6 A4 55   84 75 67 56 09 88 04 4E  h?.5...U.ugV...N
#           0010: CD 23 A1 D5                                        .#..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 16 31 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 07:51:25.000 UTC",
#       "not  after"         : "2024-01-16 07:51:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 31 03 86 8D 41 00 56   88 46 57 0A 43 87 BD 8C  .1...A.V.FW.C...
#           0010: 38 CF 6A C6                                        8.j.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#           0010: 1B C3 5A FE                                        ..Z.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.685 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 39 13 CC 90 A2 A2 94 52   2B FC 27 48 B1 3B 99 3A  9......R+.'H.;.:
#     0010: 8A 8E 17 95 FA DD 35 05   8E 58 B0 CA CB 72 32 86  ......5..X...r2.
#     0020: BC 91 E7 0D DF F1 20 2E   A5 1A 92 B3 49 A3 0B 68  ...... .....I..h
#     0030: 31 43 13 96 30 36 D7 61   5F 64 20 0F 0A D6 7D 63  1C..06.a_d ....c
#     0040: CF 08 42 E7 BC 09 D3 4F   87 2E 2B 3E FB 08 3C B6  ..B....O..+>..<.
#     0050: 7F A6 71 13 18 42 53 80   18 CD BD 26 DE D7 7D 5C  ..q..BS....&...\
#     0060: 39 B7 79 2D 8A 61 91 C1   9B EA 33 AD 43 4F F6 0F  9.y-.a....3.CO..
#     0070: C7 CA E5 F9 44 83 3B 42   9F DF D6 D1 22 39 0A 27  ....D.;B...."9.'
#     0080: 28 E6 EC 78 35 FC 9B F0   2D 22 50 76 B7 42 72 13  (..x5...-"Pv.Br.
#     0090: B0 10 4D 9E 17 EB 86 C1   50 88 17 F7 5B E9 E2 4E  ..M.....P...[..N
#     00A0: AE B1 E6 2A A4 B2 F6 EC   08 35 15 4D 32 12 29 C7  ...*.....5.M2.).
#     00B0: BD E9 44 02 6C 3B AA 98   20 DD 87 AA C4 9E EB 6C  ..D.l;.. ......l
#     00C0: AA 26 F8 83 64 B7 7C 6B   1F 78 D6 04 D5 B9 81 DC  .&..d..k.x......
#     00D0: 83 7E 2A 37 39 C2 3A 1E   2E 61 B4 E5 1C 87 ED 1A  ..*79.:..a......
#     00E0: DA 2D FE 0F C3 6F CA 2D   FE 9C F5 BF 78 F0 20 E6  .-...o.-....x. .
#     00F0: A0 FC C3 59 2C C6 0D 47   2B DB BE 5A B4 B0 03 21  ...Y,..G+..Z...!
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.688 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 61 A1 BF AA 57 ED EC 75   7B 20 F1 79 02 C4 2D B7  a...W..u. .y..-.
#     0010: DE A0 14 DD B0 D1 F8 69   4C 53 1F 1A 2D 31 38 C2  .......iLS..-18.
#     0020: D1 39 CC 56 5E BB 2A 9E   A3 8C 5C 25 A0 97 FF B8  .9.V^.*...\%....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.693 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:03.761 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "73 7C C4 DF 6A 1D F8 77 63 ED 26 54 5C C1 75 9C 3B F5 E8 39 59 5D CF 7F F1 08 10 F0 2D 91 FA A8",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 07:52:04.540 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 07:52:04.541 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-18 07:52:23.988; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 07:52:24.732 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 16 31 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 07:51:25.000 UTC",
#       "not  after"         : "2024-01-16 07:51:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 31 03 86 8D 41 00 56   88 46 57 0A 43 87 BD 8C  .1...A.V.FW.C...
#           0010: 38 CF 6A C6                                        8.j.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 90 C9 1B 76 00 62 28 C8   11 EE F5 F7 3D A5 54 E2  ...v.b(.....=.T.
#           0010: 1B C3 5A FE                                        ..Z.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 A7 B3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 07:51:22.000 UTC",
#       "not  after"         : "2024-01-16 07:51:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 31 03 86 8D 41 00 56   88 46 57 0A 43 87 BD 8C  .1...A.V.FW.C...
#           0010: 38 CF 6A C6                                        8.j.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 07:52:24.747 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 07:52:24.919 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:52:24.920 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 07:52:24.921 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 07:52:24.922 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:52:24.926 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:52:24.937 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:52:24.937 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:52:24.937 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 07:52:24.939 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "23 42 DD 7A 35 FC E8 2A 05 DB 58 13 9E C9 AA 59 F7 B4 94 4F 5B 85 6B 1C BA CA 3E 42 32 D5 32 61",
#     "session id"          : "98 B0 95 85 F7 E8 56 22 55 F3 B3 6B 5F C7 72 6F B4 17 27 C1 2E 5C 69 48 2F B4 D1 E7 9A 57 60 5F",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 46 69 CA 57 41 9D A9 0D   E1 BE 75 2D C7 57 D7 53  Fi.WA.....u-.W.S
#               0010: 82 D8 F4 0E E1 ED 04 18   EB 66 84 38 7D A0 B0 7A  .........f.8...z
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.956 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "19 05 9A 5E 06 69 1D B8 F7 65 7A AA 73 19 85 6E 06 E5 5A AA 2C D7 B1 CE 90 C5 AF B5 47 98 B2 05",
#     "session id"          : "98 B0 95 85 F7 E8 56 22 55 F3 B3 6B 5F C7 72 6F B4 17 27 C1 2E 5C 69 48 2F B4 D1 E7 9A 57 60 5F",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 12 D2 70 C2 EF 59 49 23   31 B8 51 96 56 5E 76 F3  ..p..YI#1.Q.V^v.
#             0010: 1B 3B 60 71 DF 72 DD 7C   B0 7D 7D 6A 62 E9 D6 58  .;`q.r.....jb..X
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.957 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.957 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.958 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.960 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.961 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.961 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.961 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:52:24.962 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:52:24.962 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.963 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.963 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.976 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.978 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.980 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:52:24.990 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 07:5

[...truncated too long message...]

ity.AccessController.doPrivileged(Native Method)
#   	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 07:53:41.622 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42590/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14895ms
ok 65 stop command for single port in 19539ms
ok 66 status detects locally running solr in 7930ms
ok 67 status does not expose cli parameters to end user in 270ms
ok 68 listing out files in 3093ms
ok 69 copying files around in 7016ms
ok 70 upconfig in 2762ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1262ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1258ms
ok 73 Cleanup in 1265ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 49s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/cuw4dho22vszk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 849 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/849/

1 tests failed.
FAILED:  org.apache.solr.metrics.reporters.SolrJmxReporterTest.testClosedCore

Error Message:
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=14777, name=TestMBeanThread, state=RUNNABLE, group=TGRP-SolrJmxReporterTest]

Stack Trace:
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=14777, name=TestMBeanThread, state=RUNNABLE, group=TGRP-SolrJmxReporterTest]
	at __randomizedtesting.SeedInfo.seed([2C2F15BCAD7E74F8:5B52C39C8DE71608]:0)
Caused by: java.lang.AssertionError
	at __randomizedtesting.SeedInfo.seed([2C2F15BCAD7E74F8]:0)
	at org.junit.Assert.fail(Assert.java:87)
	at org.junit.Assert.assertTrue(Assert.java:42)
	at org.junit.Assert.assertNotNull(Assert.java:713)
	at org.junit.Assert.assertNotNull(Assert.java:723)
	at org.apache.solr.metrics.reporters.SolrJmxReporterTest.lambda$testClosedCore$3(SolrJmxReporterTest.java:239)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1371 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196507ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 6250ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-18 04:18:04.845; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 04:18:07.103; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1378ms
not ok 8 accept d option with builtin config in 2681ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-18 04:18:11.168; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 04:18:11.227; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 3665ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-18 04:18:13.777; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 04:18:14.940; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2715ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-18 04:18:17.620; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 04:18:17.677; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 5530ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-18 04:18:20.977; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 04:18:23.246; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 3771ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-18 04:18:25.848; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 04:18:27.031; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2526ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-18 04:18:29.495; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 04:18:29.571; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 14 can delete collections in 10999ms
ok 15 collection delete also deletes zk config in 8254ms
ok 16 deletes accompanying zk config with nondefault name in 9492ms
ok 17 deleteConfig option can opt to leave config in zk in 7831ms
ok 18 SOLR-16755 test works with noprompt in 25874ms
ok 19 Check export command in 22772ms
ok 20 export fails on non cloud mode in 11327ms
ok 21 using curl to extract a single pdf file in 17286ms
ok 22 using the bin/solr post tool to extract content from pdf in 18105ms
ok 23 using the bin/solr post tool to crawl web site in 20616ms
ok 24 healthcheck on cloud solr in 30701ms
ok 25 start help flag prints help in 173ms
ok 26 stop help flag prints help in 182ms
ok 27 restart help flag prints help in 178ms
ok 28 status help flag prints help in 54ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 171ms
ok 30 create help flag prints help in 171ms
ok 31 createcore help flag prints help in 176ms
ok 32 createcollection help flag prints help in 173ms
ok 33 delete help flag prints help in 170ms
ok 34 version help flag prints help in 56ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 177ms
ok 36 auth help flag prints help in 177ms
ok 37 assert help flag prints help in 938ms
ok 38 post help flag prints help in 976ms
not ok 39 SQL Module in 10340ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:36677/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-18 04:21:53.098; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 04:21:53.150; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:36677/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19345ms
ok 41 icu collation in analysis-extras module in 19542ms
not ok 42 package detects no running solr in 1367ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 4 Solr nodes:
#
#   Solr process 26225 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 4 Solr nodes:
#
# Solr process 26225 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10014ms
ok 44 deploying and undeploying a collection level package in 14107ms
ok 45 Affinity placement plugin using sysprop in 17623ms
ok 46 Random placement plugin using ENV in 19337ms
ok 47 Check help command in 3735ms
ok 48 basic post with a type specified in 5651ms
ok 49 basic post WITHOUT a type specified in 12718ms
ok 50 crawling a directory in 4952ms
ok 51 crawling a web site in 4847ms
ok 52 commit and optimize and delete in 4081ms
ok 53 args mode in 6651ms
ok 54 stdin mode in 3741ms
ok 55 post solr log into solr via script in 11042ms
ok 56 post solr log into solr via cli in 7423ms
not ok 57 allowPaths - backup in 10146ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:36677/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-XKtOde%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-18 04:25:00.522; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 04:25:00.577; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:36677/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-XKtOde%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 13155ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 36677 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36677 (pid=11426). Happy searching!
#
#     INFO  - 2023-10-18 04:25:08.211; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 04:25:08.216; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 04:25:08.663; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-XKtOde/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-XKtOde/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-18 04:25:11.640; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-18 04:25:11.645; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-18 04:25:13.492; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 04:25:13.496; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12771ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 36677 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36677 (pid=12028). Happy searching!
#
#     INFO  - 2023-10-18 04:25:21.095; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 04:25:21.100; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 04:25:21.486; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-XKtOde/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-XKtOde/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 04:25:21.602; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-XKtOde/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-XKtOde/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 04:25:21.602; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-XKtOde/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-XKtOde/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-18 04:25:24.365; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-18 04:25:24.369; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-18 04:25:25.169; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-XKtOde/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-XKtOde/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-18 04:25:25.171; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-XKtOde/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-XKtOde/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 04:25:26.276; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 04:25:26.280; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 04:25:26.738; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-XKtOde/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-XKtOde/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 04:25:26.739; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-XKtOde/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-XKtOde/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10999ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 36677 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36677 (pid=12614). Happy searching!
#
#     INFO  - 2023-10-18 04:25:34.053; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 04:25:34.057; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-18 04:25:37.250; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 04:25:37.255; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13760ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-18 04:25:45.870; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-18 04:25:49.473; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-18 04:25:51.149; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 41948ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-XKtOde/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 36677 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36677 (pid=14232). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 36678 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 36678 (pid=14343). Happy searching!
#
#     INFO  - 2023-10-18 04:26:16.937; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 04:26:16.942; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 04:26:17.509; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-XKtOde/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XKtOde/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 04:26:17.512; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-XKtOde/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XKtOde/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 04:26:17.512; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(ca,h=[localhost],a=[],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-XKtOde/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XKtOde/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 04:26:17.558 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 49 05 EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 04:26:03.000 UTC",
#     "not  after"         : "2024-01-16 04:26:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 CA 2B D6 E1 12 D8 95   29 5C 56 2C 4B 11 E4 9A  ..+.....)\V,K...
#         0010: F9 1A F3 15                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A EA 6D 32 B0 71 AB B6   6E 55 EB 1D 51 3C 27 35  ..m2.q..nU..Q<'5
#         0010: D8 0E 18 06                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 0E 87 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 04:25:56.000 UTC",
#     "not  after"         : "2024-01-16 04:25:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 C5 9A C4 3E 67 46   22 5D BF 2C 4B 39 AB 0B  .....>gF"].,K9..
#         0010: 86 E1 B8 D1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 CA 2B D6 E1 12 D8 95   29 5C 56 2C 4B 11 E4 9A  ..+.....)\V,K...
#         0010: F9 1A F3 15                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 04:26:17.562 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 0E 87 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 04:25:56.000 UTC",
#     "not  after"         : "2024-01-16 04:25:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 C5 9A C4 3E 67 46   22 5D BF 2C 4B 39 AB 0B  .....>gF"].,K9..
#         0010: 86 E1 B8 D1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 CA 2B D6 E1 12 D8 95   29 5C 56 2C 4B 11 E4 9A  ..+.....)\V,K...
#         0010: F9 1A F3 15                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 0D DA C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 04:25:54.000 UTC",
#     "not  after"         : "2024-01-16 04:25:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 C5 9A C4 3E 67 46   22 5D BF 2C 4B 39 AB 0B  .....>gF"].,K9..
#         0010: 86 E1 B8 D1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 04:26:17.574 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 04:26:17.740 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 04:26:17.740 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 04:26:17.742 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 04:26:17.742 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 04:26:17.747 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 04:26:17.758 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 04:26:17.758 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 04:26:17.758 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 04:26:17.760 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "02 9B 6F 2F 78 75 78 A8 A6 17 D4 7B 16 D0 AC FD 9C A2 5A 3B BF FB 16 13 12 F8 78 6E 2D 3B 98 D5",
#   "session id"          : "A4 05 CD C8 5D D0 45 D4 87 F7 A2 F8 0F AF 8D 04 54 C2 DD 5A 3E 37 E2 BC A4 C5 EB 84 93 64 AB 10",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 32 8D 75 7A 32 F3 33 BE   C4 5C 49 A3 46 DE AD 35  2.uz2.3..\I.F..5
#             0010: 9B F1 27 55 27 B9 0F 10   07 0A C3 3D 2A A1 78 62  ..'U'......=*.xb
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.872 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9D C2 EF 7D D1 F6 27 B1 40 A5 20 CA 5F 92 C5 1C 31 15 3D 7C DE 32 F3 48 BF F7 D5 08 04 44 93 B1",
#   "session id"          : "A4 05 CD C8 5D D0 45 D4 87 F7 A2 F8 0F AF 8D 04 54 C2 DD 5A 3E 37 E2 BC A4 C5 EB 84 93 64 AB 10",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B2 38 61 04 83 A2 28 96   2D AC 76 FF 60 07 87 3D  .8a...(.-.v.`..=
#           0010: B0 AA 7F B3 4C 18 F4 4F   CA 48 1C B2 14 D2 2A 79  ....L..O.H....*y
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.873 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.873 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.877 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.877 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.877 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.878 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.878 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.878 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.878 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.878 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.880 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.880 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.880 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.880 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.880 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.880 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.880 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.880 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.881 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.881 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 04:26:17.881 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 04:26:17.881 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.881 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.881 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.892 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.898 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.900 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.905 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.905 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.905 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.905 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.909 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.910 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.910 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 04:26:17.911 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 04:26:17.911 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.916 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.916 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.916 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.916 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.917 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.917 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 04:26:17.918 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.921 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 04 75 85",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 04:25:59.000 UTC",
#       "not  after"         : "2024-01-16 04:25:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B2 CA 2B D6 E1 12 D8 95   29 5C 56 2C 4B 11 E4 9A  ..+.....)\V,K...
#           0010: F9 1A F3 15                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 4B 09 E6 4A 33 0B 3B   5A A4 41 D4 C9 A5 D5 CC  #K..J3.;Z.A.....
#           0010: 0D 13 0C 00                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:17.921 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 04:26:18.063 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 04:26:18.063 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 04:26:18.063 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 04:26:18.063 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:18.079 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 0E 87 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 04:25:56.000 UTC",
#     "not  after"         : "2024-01-16 04:25:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 C5 9A C4 3E 67 46   22 5D BF 2C 4B 39 AB 0B  .....>gF"].,K9..
#         0010: 86 E1 B8 D1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 CA 2B D6 E1 12 D8 95   29 5C 56 2C 4B 11 E4 9A  ..+.....)\V,K...
#         0010: F9 1A F3 15                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:18.082 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 65 F2 59 54 37 E9 F0 26   27 A8 8B 20 C6 3F FE 73  e.YT7..&'.. .?.s
#     0010: 08 1D F7 57 FE 93 E9 73   E7 0B 01 A4 44 EC 11 8D  ...W...s....D...
#     0020: 11 6F F1 90 58 A7 6A 1D   24 7A 12 69 56 CB 0A 9B  .o..X.j.$z.iV...
#     0030: 34 45 DB C2 7D 13 B6 69   59 E6 17 42 C5 BB 78 E9  4E.....iY..B..x.
#     0040: E2 C8 E9 7F 49 77 3F 1F   4F F1 86 3B 4B 49 CB 1A  ....Iw?.O..;KI..
#     0050: 17 A7 F3 77 2B ED EB 25   31 C2 99 EF 96 D9 0F A6  ...w+..%1.......
#     0060: 63 EB B5 B6 E6 82 AD 7D   B6 80 80 A1 0A EC 3A 49  c.............:I
#     0070: 43 40 37 D7 91 17 0C 8E   0D AF 88 BB 98 E1 A7 B5  C@7.............
#     0080: 85 E7 00 9A A2 A1 0F 0F   74 3F 45 AD 9D 17 90 3C  ........t?E....<
#     0090: DA 15 BA 15 4F A7 CB 7D   F8 F6 67 F3 0F CF E2 EC  ....O.....g.....
#     00A0: 28 D2 E6 D7 F7 42 26 95   19 48 19 B3 44 13 ED 28  (....B&..H..D..(
#     00B0: A3 23 18 E0 57 0D 5A D8   39 08 72 04 58 BE 9E CB  .#..W.Z.9.r.X...
#     00C0: F9 CC D8 89 BB F2 0B 34   4B 3D 41 A0 EC 6E 9F BE  .......4K=A..n..
#     00D0: 24 3C 01 EC 90 C2 D8 A0   60 A8 D3 D4 2A 7A F3 C4  $<......`...*z..
#     00E0: B4 E7 1A A4 14 91 A5 F3   22 FE 58 14 B1 DD 6E 41  ........".X...nA
#     00F0: 04 CE 97 92 92 BE F6 14   4B 8B E8 CC 03 60 3A 44  ........K....`:D
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:18.084 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 04 0F 4F BA EA C8 B2 3A   26 BD 0E 3A DA 05 B9 51  ..O....:&..:...Q
#     0010: 93 BC DD 02 12 F8 B9 DB   34 01 45 90 64 96 63 1A  ........4.E.d.c.
#     0020: 18 BE 83 8E F7 68 18 0E   C8 BC 1F BB 11 3C 51 93  .....h.......<Q.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:18.085 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 04:26:18.086 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 04:26:18.086 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 04:26:18.086 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 04:26:18.086 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 04:26:18.086 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 04:26:18.086 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:18.087 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:18.088 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 49 05 EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 04:26:03.000 UTC",
#       "not  after"         : "2024-01-16 04:26:03.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B2 CA 2B D6 E1 12 D8 95   29 5C 56 2C 4B 11 E4 9A  ..+.....)\V,K...
#           0010: F9 1A F3 15                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A EA 6D 32 B0 71 AB B6   6E 55 EB 1D 51 3C 27 35  ..m2.q..nU..Q<'5
#           0010: D8 0E 18 06                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "43 0E 87 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 04:25:56.000 UTC",
#       "not  after"         : "2024-01-16 04:25:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 C0 C5 9A C4 3E 67 46   22 5D BF 2C 4B 39 AB 0B  .....>gF"].,K9..
#           0010: 86 E1 B8 D1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B2 CA 2B D6 E1 12 D8 95   29 5C 56 2C 4B 11 E4 9A  ..+.....)\V,K...
#           0010: F9 1A F3 15                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:18.109 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 68 75 83 DA B5 B2 14 35   FE 96 A7 1A A3 95 1D 3B  hu.....5.......;
#     0010: C1 11 51 C4 5A CA 8D FA   E2 71 63 2D 3F DE A4 EF  ..Q.Z....qc-?...
#     0020: D9 63 BC E5 45 F2 C1 5F   A6 69 A3 12 E1 F0 94 02  .c..E.._.i......
#     0030: 13 AC 99 A3 F1 CE 2B 4F   2C 0C 17 FA 95 89 57 E3  ......+O,.....W.
#     0040: 2E A5 C7 3C 68 2C 14 5F   EC 01 44 AA E9 C7 4C D7  ...<h,._..D...L.
#     0050: 24 CC 14 5E 53 26 BF C0   85 03 40 D3 6A 8F F0 FF  $..^S&....@.j...
#     0060: 13 BB F9 7C 0A 83 20 21   68 7C 8C 2C 8D 1F 72 8B  ...... !h..,..r.
#     0070: BA 74 8F FE 09 60 A6 2A   81 D9 31 81 BE 9E 3B 45  .t...`.*..1...;E
#     0080: 61 39 DB F6 0E D2 8F 6F   57 38 BF 30 BF 25 A6 BD  a9.....oW8.0.%..
#     0090: CB 95 32 2F AF DE B6 77   D5 B2 03 CD E3 48 D4 FE  ..2/...w.....H..
#     00A0: 47 C8 13 BD 88 6B DB 47   DD F0 CC D2 AB 14 71 04  G....k.G......q.
#     00B0: 37 35 D5 CA 94 5C 5D 37   65 F2 4F 8F 7C 72 C7 C5  75...\]7e.O..r..
#     00C0: E0 4B 9A 84 10 68 F1 B4   74 42 64 CF C8 1F 25 74  .K...h..tBd...%t
#     00D0: 18 C9 A0 D2 74 62 12 20   A8 8A 88 E1 2F B6 8C 3D  ....tb. ..../..=
#     00E0: F5 FE 4E DF 4D F2 92 CF   4A F5 C0 63 A7 53 F5 0E  ..N.M...J..c.S..
#     00F0: 59 99 46 D7 8C 31 D4 BE   4F EC A8 F5 3E DA 39 B2  Y.F..1..O...>.9.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:18.110 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AF 29 5D 0E B6 66 79 70   9A 2C 9C 2A 79 E0 63 DD  .)]..fyp.,.*y.c.
#     0010: 1F 9F CC F3 C8 3C 7F 72   1A D7 1C 8A C5 1B 4A 65  .....<.r......Je
#     0020: EF AD 8C DA A7 D0 88 A9   33 CD B0 B3 04 F5 EF 82  ........3.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:18.110 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 04:26:18.356 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "10 B9 4B EE C0 C6 53 A4 22 A8 F1 A5 D4 DF CF 63 04 9E CD 89 A9 9A B1 53 DE 91 3A 97 4D 4F 6C 6A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 04:26:18.607 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 04:26:18.610 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-18 04:26:18.614 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-18 04:26:19.939; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 04:26:19.944; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 04:26:20.923; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-XKtOde/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XKtOde/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 04:26:20.925; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-XKtOde/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XKtOde/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 04:26:20.925; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-XKtOde/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XKtOde/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 04:26:21.392 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 49 05 EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 04:26:03.000 UTC",
#     "not  after"         : "2024-01-16 04:26:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 CA 2B D6 E1 12 D8 95   29 5C 56 2C 4B 11 E4 9A  ..+.....)\V,K...
#         0010: F9 1A F3 15                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A EA 6D 32 B0 71 AB B6   6E 55 EB 1D 51 3C 27 35  ..m2.q..nU..Q<'5
#         0010: D8 0E 18 06                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 0E 87 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 04:25:56.000 UTC",
#     "not  after"         : "2024-01-16 04:25:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 C5 9A C4 3E 67 46   22 5D BF 2C 4B 39 AB 0B  .....>gF"].,K9..
#         0010: 86 E1 B8 D1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 CA 2B D6 E1 12 D8 95   29 5C 56 2C 4B 11 E4 9A  ..+.....)\V,K...
#         0010: F9 1A F3 15                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 04:26:21.396 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 0E 87 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 04:25:56.000 UTC",
#     "not  after"         : "2024-01-16 04:25:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 C5 9A C4 3E 67 46   22 5D BF 2C 4B 39 AB 0B  .....>gF"].,K9..
#         0010: 86 E1 B8 D1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B2 CA 2B D6 E1 12 D8 95   29 5C 56 2C 4B 11 E4 9A  ..+.....)\V,K...
#         0010: F9 1A F3 15                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 0D DA C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 04:25:54.000 UTC",
#     "not  after"         : "2024-01-16 04:25:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 C5 9A C4 3E 67 46   22 5D BF 2C 4B 39 AB 0B  .....>gF"].,K9..
#         0010: 86 E1 B8 D1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 04:26:21.428 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 04:26:21.705 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 04:26:21.706 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 04:26:21.708 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 04:26:21.708 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 04:26:21.716 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 04:26:21.729 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 04:26:21.729 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 04:26:21.729 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 04:26:21.732 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "87 4C AC 8F 79 61 E4 A3 42 25 BB B0 10 E7 71 F5 14 A0 E4 00 00 77 1F 76 EC 62 10 C0 A4 17 32 87",
#   "session id"          : "C0 AD B3 56 F2 3D CC 5B ED 6A C8 45 BC CB 0D 5C 8E 2C DC 6A 97 B9 1C 3A DA E6 D0 40 79 EC F4 84",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 

[...truncated too long message...]

iticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B0 17 A1 ED 79 DC 48 C7   2F 25 D2 4B 98 40 B4 01  ....y.H./%.K.@..
#         0010: 4A D9 7B 4D                                        J..M
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 93 84 EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 04:26:38.000 UTC",
#     "not  after"         : "2024-01-16 04:26:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B0 17 A1 ED 79 DC 48 C7   2F 25 D2 4B 98 40 B4 01  ....y.H./%.K.@..
#         0010: 4A D9 7B 4D                                        J..M
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 15 AC BB 9B A7 7B DB   4F 1B D2 A1 D3 DE 8F 62  ........O......b
#         0010: 2F 53 BF 37                                        /S.7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 04:27:08.534 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14317ms
ok 65 stop command for single port in 17583ms
not ok 66 status detects locally running solr in 4814ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (17 lines):
#
#   Found 4 Solr nodes:
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 25909 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1126 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 4 Solr nodes:
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 25909 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1126 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 247ms
ok 68 listing out files in 2627ms
ok 69 copying files around in 6887ms
ok 70 upconfig in 2903ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1227ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1225ms
not ok 73 Cleanup in 5903ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (17 lines):
#
#   Found 4 Solr nodes:
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 25909 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1126 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 4 Solr nodes:
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 25909 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1126 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.metrics.reporters.SolrJmxReporterTest.testClosedCore (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.metrics.reporters.SolrJmxReporterTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.metrics.reporters.SolrJmxReporterTest.testClosedCore" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=2C2F15BCAD7E74F8 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 12s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/73mxrytb7k46u

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 848 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/848/

All tests passed

Build Log:
[...truncated 1209 lines...]
# ERROR: Error from server at http://localhost:42037/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=javabin&version=2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 46 Random placement plugin using ENV in 16714ms
ok 47 Check help command in 4830ms
ok 48 basic post with a type specified in 6111ms
ok 49 basic post WITHOUT a type specified in 12058ms
ok 50 crawling a directory in 4696ms
ok 51 crawling a web site in 4819ms
ok 52 commit and optimize and delete in 3969ms
ok 53 args mode in 6894ms
ok 54 stdin mode in 3705ms
ok 55 post solr log into solr via script in 10621ms
ok 56 post solr log into solr via cli in 7432ms
ok 57 allowPaths - backup in 17090ms
ok 58 start solr with ssl in 19556ms
not ok 59 use different hostname when not checking peer-name in 21423ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 42037 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42037 (pid=613341). Happy searching!
#
#     INFO  - 2023-10-18 01:07:08.973; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 01:07:08.978; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 01:07:09.445; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@44c79f32(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-AZUeUy/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-AZUeUy/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 01:07:09.557; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-AZUeUy/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-AZUeUy/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 01:07:09.557; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-AZUeUy/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-AZUeUy/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-18 01:07:20.012; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-18 01:07:20.016; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-18 01:07:20.434; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@6175619b[provider=null,keyStore=file:///tmp/bats-run-AZUeUy/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-AZUeUy/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:42037/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 01:07:21.846; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 01:07:21.850; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 01:07:22.706; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 01:07:22.742; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 17243ms
ok 61 start solr with client truststore and security manager in 19511ms
not ok 62 start solr with mTLS needed in 56191ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-AZUeUy/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 42037 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42037 (pid=616032). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 42038 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42038 (pid=616203). Happy searching!
#
#     INFO  - 2023-10-18 01:08:25.913; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 01:08:25.920; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 01:08:26.827; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-AZUeUy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AZUeUy/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 01:08:26.829; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-AZUeUy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AZUeUy/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 01:08:26.829; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(ca,h=[localhost],a=[],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-AZUeUy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AZUeUy/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 01:08:26.888 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 69 2C CF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 01:08:11.000 UTC",
#     "not  after"         : "2024-01-16 01:08:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#         0010: 0F 8D A1 B3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 16 A9 DF 2E B9 DB 96   54 4D D5 43 51 07 16 C5  ........TM.CQ...
#         0010: AF 72 72 20                                        .rr
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B8 E6 E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 01:08:04.000 UTC",
#     "not  after"         : "2024-01-16 01:08:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 08 2F D5 12 73 71 31   56 72 2E 18 4C 73 C5 62  ../..sq1Vr..Ls.b
#         0010: FF F9 4A 87                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#         0010: 0F 8D A1 B3                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 01:08:26.892 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B FC 85 E6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 01:08:02.000 UTC",
#     "not  after"         : "2024-01-16 01:08:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 08 2F D5 12 73 71 31   56 72 2E 18 4C 73 C5 62  ../..sq1Vr..Ls.b
#         0010: FF F9 4A 87                                        ..J.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B8 E6 E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 01:08:04.000 UTC",
#     "not  after"         : "2024-01-16 01:08:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 08 2F D5 12 73 71 31   56 72 2E 18 4C 73 C5 62  ../..sq1Vr..Ls.b
#         0010: FF F9 4A 87                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#         0010: 0F 8D A1 B3                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 01:08:26.909 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 01:08:27.460 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:27.461 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 01:08:27.466 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 01:08:27.466 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:27.476 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:27.492 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:27.492 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:27.493 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:27.498 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D8 30 82 4E B5 B9 60 D0 28 FD C5 16 4F 93 53 AF B8 7A 7A 81 49 A7 B7 CE E7 90 9A 95 67 5A FD 63",
#   "session id"          : "D4 B9 4A 9B 3A FC CB D1 E2 29 CC 6D 36 83 C3 98 6B 29 BE 46 77 05 0F 34 D0 BA 26 52 74 C9 FC 49",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0D 19 37 B8 87 BF B3 92   12 CF B5 05 E5 05 7D E0  ..7.............
#             0010: E4 C8 1B 8A E4 AA A0 B1   7C DF 77 6D DC F8 2B 0F  ..........wm..+.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.792 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9E 13 4D 6D 55 A2 42 18 94 C5 FD D0 18 15 E2 15 64 B1 72 47 E7 96 E5 4A C2 65 2E DC C9 35 F5 67",
#   "session id"          : "D4 B9 4A 9B 3A FC CB D1 E2 29 CC 6D 36 83 C3 98 6B 29 BE 46 77 05 0F 34 D0 BA 26 52 74 C9 FC 49",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E8 91 00 14 F5 F4 06 66   E8 B8 3F B6 EF 1A 4A 33  .......f..?...J3
#           0010: 38 57 0E 86 8D 42 A6 84   EF 4C 77 13 90 CB 3E 04  8W...B...Lw...>.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.792 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.796 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.798 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.798 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.798 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.798 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.798 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.799 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.799 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.807 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.807 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.807 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.807 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.807 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.807 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.808 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.808 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.808 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.808 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:27.808 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:27.808 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.808 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.808 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.828 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.832 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.833 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.836 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.851 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.852 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.852 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.852 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:27.857 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:27.857 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.859 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.859 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.859 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.860 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.861 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.861 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:27.861 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.867 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 2F 3E AC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 01:08:07.000 UTC",
#       "not  after"         : "2024-01-16 01:08:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#           0010: 0F 8D A1 B3                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A F4 C4 55 9E C7 69 CF   54 00 73 09 83 6F E1 67  Z..U..i.T.s..o.g
#           0010: B2 99 68 EB                                        ..h.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.868 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.978 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B8 E6 E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 01:08:04.000 UTC",
#     "not  after"         : "2024-01-16 01:08:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 08 2F D5 12 73 71 31   56 72 2E 18 4C 73 C5 62  ../..sq1Vr..Ls.b
#         0010: FF F9 4A 87                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#         0010: 0F 8D A1 B3                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.981 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 86 8C 97 5C 2E 61 43 2E   BD 69 B6 04 90 9B B4 35  ...\.aC..i.....5
#     0010: 97 C9 38 D3 5C DA 17 67   6F C5 35 D8 02 F7 A6 22  ..8.\..go.5...."
#     0020: EB 0F 67 01 9C 09 98 3A   01 C1 49 38 81 A4 76 1D  ..g....:..I8..v.
#     0030: BB 3E 6D E8 DB 44 08 7F   73 6E 63 FD 24 CE 60 40  .>m..D..snc.$.`@
#     0040: 5B 2B 45 09 ED 25 B8 2A   67 93 EC 4E 13 B2 23 17  [+E..%.*g..N..#.
#     0050: 27 54 C8 E2 A3 79 6D B5   AC C3 69 E6 53 81 E6 65  'T...ym...i.S..e
#     0060: 5C 95 23 D3 C9 17 5E 95   58 BB C8 29 2A C9 CF 74  \.#...^.X..)*..t
#     0070: A4 04 DB 9E 34 C6 D6 05   92 40 B2 83 EB A8 DE 64  ....4....@.....d
#     0080: 05 0C 72 35 9B 31 BA A4   F5 20 89 8E 07 4F 2A 61  ..r5.1... ...O*a
#     0090: EB 67 55 E1 6B 97 1C 03   3D 31 2C 4D 4F 32 FA 4D  .gU.k...=1,MO2.M
#     00A0: A1 43 61 09 0D 9B E0 F0   6B 79 3C 61 A8 A5 65 C5  .Ca.....ky<a..e.
#     00B0: FF 8A 6D FB 21 1E F8 1D   E1 DF BE FF 1C 63 61 6E  ..m.!........can
#     00C0: DC 6B 0B 8D 4C 2C 52 28   AF AE 77 E3 85 8E 7C 12  .k..L,R(..w.....
#     00D0: DC 36 46 BD 98 0E 96 19   D6 8D BE 1B 61 6C 37 14  .6F.........al7.
#     00E0: 7D F8 D5 37 21 1B 9A 0E   D7 DC BE 64 0F 7A DA 73  ...7!......d.z.s
#     00F0: A1 AE 27 61 26 69 BF 74   31 77 EC 3B FA 07 EF B8  ..'a&i.t1w.;....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:27.984 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A3 E8 E0 00 98 44 95 E6   96 3B EC 8F B3 A5 A1 AF  .....D...;......
#     0010: E9 1A 7A 80 E6 AC 07 77   DD 7F 02 4C C2 2E 9B 81  ..z....w...L....
#     0020: 49 8F 2D 17 3B 37 3C 97   A2 5A E7 37 77 C2 BF 98  I.-.;7<..Z.7w...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:28.320 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 01:08:28.322 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:28.322 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 01:08:28.322 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:28.322 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 01:08:28.322 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:28.323 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:28.323 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:28.325 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B 69 2C CF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 01:08:11.000 UTC",
#       "not  after"         : "2024-01-16 01:08:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#           0010: 0F 8D A1 B3                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 16 A9 DF 2E B9 DB 96   54 4D D5 43 51 07 16 C5  ........TM.CQ...
#           0010: AF 72 72 20                                        .rr
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B8 E6 E2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 01:08:04.000 UTC",
#       "not  after"         : "2024-01-16 01:08:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 08 2F D5 12 73 71 31   56 72 2E 18 4C 73 C5 62  ../..sq1Vr..Ls.b
#           0010: FF F9 4A 87                                        ..J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#           0010: 0F 8D A1 B3                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:28.370 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 02 3E F2 33 B1 BA 8B 72   5E B1 FE 9F CE BA 56 43  .>.3...r^.....VC
#     0010: D0 B5 79 CE 3E 10 39 87   A6 DC 41 E0 32 07 DE B7  ..y.>.9...A.2...
#     0020: 9F 70 8D FB 13 37 D3 41   CA 70 C3 01 84 DB 89 9D  .p...7.A.p......
#     0030: 08 03 5C 75 08 2B 49 3E   CE 69 B2 2F BE 60 BE 34  ..\u.+I>.i./.`.4
#     0040: A1 F9 06 DF 8F D7 15 55   80 E7 CD E8 43 49 1D 04  .......U....CI..
#     0050: 7A 93 07 64 59 6E 5A BC   CF 19 CE B3 8E 39 31 A7  z..dYnZ......91.
#     0060: 22 AA 96 BD 2B DC A9 7F   82 2A C9 5C CD 01 5F D1  "...+....*.\.._.
#     0070: 03 BD 25 9D 8E D3 90 91   F1 9C CE D7 E0 5A 0F E2  ..%..........Z..
#     0080: 1E 98 1A 1A 29 BD 87 DB   D2 80 6D 2C 54 25 54 EA  ....).....m,T%T.
#     0090: 2B 73 45 17 54 76 89 81   B8 A2 EC CE 21 0F F1 66  +sE.Tv......!..f
#     00A0: 56 14 A7 DF 81 7D 33 44   EF D4 84 DB 04 18 2A DE  V.....3D......*.
#     00B0: A9 B5 C6 EC 20 53 99 52   34 37 45 5C DC F0 BB 85  .... S.R47E\....
#     00C0: A6 B1 83 AB 32 0D BC B2   F9 02 5C 37 EC AE AE BD  ....2.....\7....
#     00D0: 8C 35 E7 1C E5 AB 53 54   C9 02 4E 10 FC F0 6D 1D  .5....ST..N...m.
#     00E0: 54 50 9C E9 17 C9 0D 1C   91 B5 09 7C C4 E2 19 51  TP.............Q
#     00F0: 66 90 0B 56 1A 76 E5 20   9C 5F 30 79 A7 6D 8C 78  f..V.v. ._0y.m.x
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:28.377 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C0 BE B8 8A A1 C9 61 6B   62 9C CE 9B 70 CE 2F AA  ......akb...p./.
#     0010: 8D D7 85 E1 8C CC 11 D4   A5 40 B9 AB B3 F9 25 A2  .........@....%.
#     0020: 25 88 58 44 17 FB F2 6E   CB F4 EB 1F D7 C7 BB 49  %.XD...n.......I
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:28.381 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:28.487 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "4F DF 19 A2 08 05 69 56 92 77 0F 4F 76 BA A4 04 91 F2 90 B4 07 3F 27 45 23 03 68 06 49 DE 1E 57",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 01:08:28.881 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 01:08:28.882 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 01:08:31.171; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 01:08:31.179; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 01:08:31.562; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-AZUeUy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AZUeUy/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 01:08:31.564; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-AZUeUy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AZUeUy/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 01:08:31.565; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-AZUeUy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AZUeUy/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 01:08:31.602 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 69 2C CF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 01:08:11.000 UTC",
#     "not  after"         : "2024-01-16 01:08:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#         0010: 0F 8D A1 B3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 16 A9 DF 2E B9 DB 96   54 4D D5 43 51 07 16 C5  ........TM.CQ...
#         0010: AF 72 72 20                                        .rr
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B8 E6 E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 01:08:04.000 UTC",
#     "not  after"         : "2024-01-16 01:08:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 08 2F D5 12 73 71 31   56 72 2E 18 4C 73 C5 62  ../..sq1Vr..Ls.b
#         0010: FF F9 4A 87                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#         0010: 0F 8D A1 B3                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 01:08:31.607 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B FC 85 E6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 01:08:02.000 UTC",
#     "not  after"         : "2024-01-16 01:08:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 08 2F D5 12 73 71 31   56 72 2E 18 4C 73 C5 62  ../..sq1Vr..Ls.b
#         0010: FF F9 4A 87                                        ..J.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B8 E6 E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 01:08:04.000 UTC",
#     "not  after"         : "2024-01-16 01:08:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 08 2F D5 12 73 71 31   56 72 2E 18 4C 73 C5 62  ../..sq1Vr..Ls.b
#         0010: FF F9 4A 87                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#         0010: 0F 8D A1 B3                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 01:08:31.619 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 01:08:31.804 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:31.804 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 01:08:31.806 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 01:08:31.806 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:31.811 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:31.823 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:31.823 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:31.823 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:31.825 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "88 13 26 5F 42 1B 17 4D 16 B2 27 17 85 BC B9 61 7A 64 16 89 53 AB 69 44 C0 FF 22 55 8D F7 71 99",
#   "session id"          : "81 44 EA 9F 62 25 12 07 86 1E 56 D4 AA 7E 5A 9A 51 F0 A2 AC 47 0B C5 76 62 56 B8 C6 3F 8C 59 18",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EB 66 EB F4 5B DC B4 BC   82 D6 57 42 ED 97 76 0D  .f..[.....WB..v.
#             0010: 6D 71 3E 13 C4 92 C2 6E   D1 0E 42 CB DC B4 56 38  mq>....n..B...V8
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.911 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B1 B9 65 7E 26 28 56 3F 76 44 3C FE 82 A4 EC E7 C9 99 B1 F3 D5 5E C5 31 9A 65 30 1A 43 7C 34 81",
#   "session id"          : "81 44 EA 9F 62 25 12 07 86 1E 56 D4 AA 7E 5A 9A 51 F0 A2 AC 47 0B C5 76 62 56 B8 C6 3F 8C 59 18",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 68 0A 42 F2 76 4D F9 59   64 1F 97 6C BE F7 DB E8  h.B.vM.Yd..l....
#           0010: EE B8 1A 5B A8 43 62 BB   BF 27 2B 5D F3 6B 5B 19  ...[.Cb..'+].k[.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.911 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.911 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.913 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.913 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.918 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.918 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.918 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.919 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.919 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.919 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.919 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.919 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.919 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.919 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:31.920 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:31.920 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.925 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.925 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.943 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.945 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.947 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.963 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.965 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.965 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.966 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.966 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:31.966 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:31.966 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.967 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.968 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.968 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.968 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.969 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.970 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:31.970 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.978 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 2F 3E AC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 01:08:07.000 UTC",
#       "not  after"         : "2024-01-16 01:08:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#           0010: 0F 8D A1 B3                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A F4 C4 55 9E C7 69 CF   54 00 73 09 83 6F E1 67  Z..U..i.T.s..o.g
#           0010: B2 99 68 EB                                        ..h.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:31.978 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:32.035 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B8 E6 E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 01:08:04.000 UTC",
#     "not  after"         : "2024-01-16 01:08:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 08 2F D5 12 73 71 31   56 72 2E 18 4C 73 C5 62  ../..sq1Vr..Ls.b
#         0010: FF F9 4A 87                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#         0010: 0F 8D A1 B3                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:32.038 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 86 6B 78 25 B0 74 B4 41   76 05 B1 47 97 7D 46 D1  .kx%.t.Av..G..F.
#     0010: 10 BA 77 30 9D 75 12 6E   4D 44 32 2B B6 4D 9B D1  ..w0.u.nMD2+.M..
#     0020: 77 0F ED 9D ED 1B 61 E0   9F 10 B0 D2 9E 74 80 D4  w.....a......t..
#     0030: 0F 15 4C CA 31 3E 9B F6   35 8F 70 AA A5 C5 41 21  ..L.1>..5.p...A!
#     0040: 24 41 E2 DC E6 97 AD 28   39 38 1E 70 98 0D 44 5A  $A.....(98.p..DZ
#     0050: EB 5B 2B AD 44 12 D8 82   A2 49 ED A9 B9 D9 93 C8  .[+.D....I......
#     0060: 17 4D EE 9E CE 2D BB 73   50 A8 D2 19 19 63 E6 26  .M...-.sP....c.&
#     0070: 30 3E DB DB 30 20 8C 9F   DF BD F2 40 E9 36 02 41  0>..0 .....@.6.A
#     0080: CA 9A 07 E1 26 DC B3 62   02 B3 36 6C B6 E8 4A 2E  ....&..b..6l..J.
#     0090: 14 C7 14 2F 19 52 D1 00   E6 C3 D4 8B 1A 09 CB F4  .../.R..........
#     00A0: 47 21 43 2A 6E A2 56 BC   19 2E E5 A8 C1 45 0A 02  G!C*n.V......E..
#     00B0: 27 29 EC EA BE 0A 75 5A   DC DA F2 AE C3 61 29 23  ')....uZ.....a)#
#     00C0: 2D 69 0E 35 86 74 47 FD   6C AA 80 B0 22 1C 0C A2  -i.5.tG.l..."...
#     00D0: 62 EE 82 AB 03 F9 1B 06   B2 5E 71 EB EF CF 19 D7  b........^q.....
#     00E0: 05 7D 39 22 85 50 37 8D   B7 A2 84 90 24 02 DB B0  ..9".P7.....$...
#     00F0: AF 4B 3D 46 53 EA A9 B8   EA A8 AE 40 33 D7 0E 39  .K=FS......@3..9
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:32.040 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D2 53 6A F6 7B A7 E5 8A   38 94 92 7E 14 BF BB 18  .Sj.....8.......
#     0010: E5 17 06 CB 41 84 59 EC   20 3D 38 42 28 24 C6 38  ....A.Y. =8B($.8
#     0020: EB 99 99 EF C5 3B C8 08   99 29 3B 9A 0F 9D 1F 23  .....;...);....#
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:32.041 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 01:08:32.042 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:32.042 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 01:08:32.043 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:32.043 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 01:08:32.043 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:32.043 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:32.043 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:32.045 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B 69 2C CF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 01:08:11.000 UTC",
#       "not  after"         : "2024-01-16 01:08:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#           0010: 0F 8D A1 B3                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 16 A9 DF 2E B9 DB 96   54 4D D5 43 51 07 16 C5  ........TM.CQ...
#           0010: AF 72 72 20                                        .rr
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B8 E6 E2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 01:08:04.000 UTC",
#       "not  after"         : "2024-01-16 01:08:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 08 2F D5 12 73 71 31   56 72 2E 18 4C 73 C5 62  ../..sq1Vr..Ls.b
#           0010: FF F9 4A 87                                        ..J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#           0010: 0F 8D A1 B3                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:32.068 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7F 78 E4 02 E4 5D 66 E5   89 8D 29 30 7E F0 02 AB  .x...]f...)0....
#     0010: 04 45 93 0D 49 C7 9B 53   02 BC 2A 44 76 49 45 30  .E..I..S..*DvIE0
#     0020: A1 CE 3B B5 E1 29 49 C0   1A 59 9E 4B 90 E5 66 E9  ..;..)I..Y.K..f.
#     0030: 9D 79 0A BB 5A 85 34 55   8B 69 E3 A8 A9 56 0C B2  .y..Z.4U.i...V..
#     0040: 41 20 C5 04 57 73 7D 3F   3F EF 6C 4C B7 EA 19 A2  A ..Ws.??.lL....
#     0050: 04 FB 4A B7 EF D2 8F 9D   E4 17 2D 6C A5 92 F7 4D  ..J.......-l...M
#     0060: 18 C0 6A 7E FF FA 19 7F   C0 BC 97 80 58 45 08 9C  ..j.........XE..
#     0070: D8 4C 03 CF 94 BD 5A BB   BD B8 96 D3 E8 44 0C 86  .L....Z......D..
#     0080: A9 DA 62 E6 96 A0 43 65   9C 4E 76 24 E0 FE 74 41  ..b...Ce.Nv$..tA
#     0090: 8A EB B5 61 3E E2 9E 62   D8 59 2C ED 51 58 C5 F1  ...a>..b.Y,.QX..
#     00A0: AF 3E 0D E9 FA 6F 51 35   68 35 4E 86 51 5F 88 A3  .>...oQ5h5N.Q_..
#     00B0: 44 79 9D 5B 83 55 E0 1F   1E 4B 24 07 E3 F5 3B 76  Dy.[.U...K$...;v
#     00C0: 22 76 D1 10 DD 12 A2 9C   E8 BE 87 87 45 9E 37 E0  "v..........E.7.
#     00D0: B2 8F FD 59 90 92 A5 BC   FD D4 53 9E 98 AB 6C 1C  ...Y......S...l.
#     00E0: 89 53 D4 41 48 71 32 D2   81 3D 76 FC C4 81 3C BF  .S.AHq2..=v...<.
#     00F0: 07 FE D2 24 0A 15 18 60   03 08 E6 3F AD 30 57 D7  ...$...`...?.0W.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:32.069 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F4 CD F9 7C 53 5A CA 9B   41 F8 AA 1F 62 8A D1 9D  ....SZ..A...b...
#     0010: 87 15 4E 1A 5A 2D BE 3E   78 ED 72 CC EF 14 8A E6  ..N.Z-.>x.r.....
#     0020: 9B 9B D7 4C D9 8B D9 2F   78 90 08 A8 BB 52 90 5A  ...L.../x....R.Z
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:32.070 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:32.136 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "8B 5C A5 99 FE 12 88 DE 47 22 E8 95 CF A7 7F CD BB E5 68 21 04 8B E7 AB C9 A2 C8 EE 45 AB 6B 54",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 01:08:32.589 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 01:08:32.590 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-18 01:08:46.559; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 01:08:46.869 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B FC 85 E6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 01:08:02.000 UTC",
#       "not  after"         : "2024-01-16 01:08:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 08 2F D5 12 73 71 31   56 72 2E 18 4C 73 C5 62  ../..sq1Vr..Ls.b
#           0010: FF F9 4A 87                                        ..J.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B8 E6 E2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 01:08:04.000 UTC",
#       "not  after"         : "2024-01-16 01:08:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 08 2F D5 12 73 71 31   56 72 2E 18 4C 73 C5 62  ../..sq1Vr..Ls.b
#           0010: FF F9 4A 87                                        ..J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 6B DB A3 AE 45 60 04   F1 78 B5 83 95 20 58 8D  .k...E`..x... X.
#           0010: 0F 8D A1 B3                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 01:08:46.883 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 01:08:47.053 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:47.054 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 01:08:47.055 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 01:08:47.056 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:47.060 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:47.073 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:47.073 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:47.074 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 01:08:47.076 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "AA 50 13 E4 18 C9 FA A7 5B F4 5E C1 99 82 33 15 18 6A 5C AA 07 D1 55 E4 AB 51 AB D3 ED 89 AA 31",
#     "session id"          : "92 93 2B C4 61 8D 70 C4 A2 3C 2A D5 2A D6 A4 D9 E8 66 C9 8F 46 67 E6 42 C0 5B E9 37 E8 E5 60 38",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: F5 B7 43 3A 3D 8A 3A F2   21 05 37 9C 44 5F D4 78  ..C:=.:.!.7.D_.x
#               0010: E6 1B 41 01 38 E8 39 58   9F 4D 84 A5 88 AD 34 57  ..A.8.9X.M....4W
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.095 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D4 E0 EA 07 47 C0 67 97 73 9B BC 39 8B 07 5B 5A 0D FF DA F4 DB 1D 35 4C 38 0F CA 83 C0 6D D7 50",
#     "session id"          : "92 93 2B C4 61 8D 70 C4 A2 3C 2A D5 2A D6 A4 D9 E8 66 C9 8F 46 67 E6 42 C0 5B E9 37 E8 E5 60 38",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: C3 1D 39 E0 3C 6A FE EA   02 36 BB B4 17 17 7F 1C  ..9.<j...6......
#             0010: 65 6E 5C C1 D5 8A 53 EF   DC 8F 85 76 58 07 DC 03  en\...S....vX...
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.096 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.096 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.097 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.098 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.098 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.098 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.098 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.098 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.099 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.106 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.106 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.106 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.106 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.106 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:47.108 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:47.108 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.119 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.121 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.123 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.127 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.127 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.127 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.128 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.128 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.128 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 01:08:47.128 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:47.129 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:08:47.131 UTC|SSLExtension

[...truncated too long message...]

.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 01:10:04.026 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 01:10:04.088 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 01:10:04.088 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 01:10:04.088 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 01:10:04.088 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42038/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14705ms
ok 65 stop command for single port in 18316ms
ok 66 status detects locally running solr in 7692ms
ok 67 status does not expose cli parameters to end user in 285ms
ok 68 listing out files in 2734ms
ok 69 copying files around in 6755ms
ok 70 upconfig in 2657ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1238ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1252ms
ok 73 Cleanup in 1269ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 51s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/gpu4onbz5lds2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 847 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/847/

All tests passed

Build Log:
[...truncated 1211 lines...]
# ERROR: Error from server at http://localhost:46085/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=javabin&version=2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 46 Random placement plugin using ENV in 16205ms
ok 47 Check help command in 4459ms
ok 48 basic post with a type specified in 5886ms
ok 49 basic post WITHOUT a type specified in 12029ms
ok 50 crawling a directory in 4405ms
ok 51 crawling a web site in 5180ms
ok 52 commit and optimize and delete in 3887ms
ok 53 args mode in 6405ms
ok 54 stdin mode in 3716ms
ok 55 post solr log into solr via script in 9993ms
ok 56 post solr log into solr via cli in 7337ms
ok 57 allowPaths - backup in 16739ms
ok 58 start solr with ssl in 18696ms
not ok 59 use different hostname when not checking peer-name in 20875ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 46085 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46085 (pid=351751). Happy searching!
#
#     INFO  - 2023-10-17 22:56:46.179; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 22:56:46.184; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 22:56:46.552; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-PjjjDx/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-PjjjDx/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 22:56:46.650; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-PjjjDx/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-PjjjDx/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 22:56:46.651; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-PjjjDx/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-PjjjDx/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-17 22:56:56.790; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-17 22:56:56.795; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-17 22:56:57.216; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@751d3241[provider=null,keyStore=file:///tmp/bats-run-PjjjDx/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-PjjjDx/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:46085/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-17 22:56:58.777; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 22:56:58.782; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-17 22:56:59.609; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 22:56:59.645; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 17757ms
ok 61 start solr with client truststore and security manager in 19782ms
not ok 62 start solr with mTLS needed in 56731ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-PjjjDx/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 46085 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46085 (pid=354510). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 46086 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]  
# Started Solr server on port 46086 (pid=354637). Happy searching!
#
#     INFO  - 2023-10-17 22:58:02.421; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 22:58:02.433; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 22:58:03.622; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-PjjjDx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PjjjDx/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 22:58:03.625; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fd4acee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-PjjjDx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PjjjDx/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 22:58:03.628; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@165b8a71(ca,h=[localhost],a=[],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-PjjjDx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PjjjDx/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 22:58:03.719 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 65 66 5C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 22:57:49.000 UTC",
#     "not  after"         : "2024-01-15 22:57:49.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#         0010: 4E 90 EE 56                                        N..V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 60 7E B4 A8 53 D6 9E   07 71 7E A7 B1 43 5D E7  .`...S...q...C].
#         0010: AC 54 F9 98                                        .T..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 98 C4 D8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 22:57:42.000 UTC",
#     "not  after"         : "2024-01-15 22:57:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 88 10 7F DA 9B 7B 89   A8 33 C3 AE E0 DF 27 A5  .........3....'.
#         0010: 91 92 DF 4A                                        ...J
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#         0010: 4E 90 EE 56                                        N..V
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 22:58:03.727 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 98 C4 D8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 22:57:42.000 UTC",
#     "not  after"         : "2024-01-15 22:57:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 88 10 7F DA 9B 7B 89   A8 33 C3 AE E0 DF 27 A5  .........3....'.
#         0010: 91 92 DF 4A                                        ...J
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#         0010: 4E 90 EE 56                                        N..V
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 A5 B0 DF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 22:57:40.000 UTC",
#     "not  after"         : "2024-01-15 22:57:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 88 10 7F DA 9B 7B 89   A8 33 C3 AE E0 DF 27 A5  .........3....'.
#         0010: 91 92 DF 4A                                        ...J
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 22:58:03.745 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 22:58:04.128 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:04.129 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 22:58:04.130 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 22:58:04.131 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:04.139 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:04.150 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:04.150 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:04.150 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:04.152 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D3 40 C2 E3 71 B5 AB 3C 06 0A 96 CC 11 32 73 D1 7D 1E E1 CE FA 71 C4 85 EA 77 7F 17 43 52 6F C6",
#   "session id"          : "54 3E 40 E6 64 AE BB 7B C2 EC BC 40 C5 90 CC ED DF AB BC 60 02 30 9D 2F B2 36 DD DD 8F DA F6 6F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F1 4B B2 D0 73 8F 02 4D   54 AE 68 3D F8 FE 47 F4  .K..s..MT.h=..G.
#             0010: 10 5D 79 EA D2 DB 64 9F   78 05 96 51 8D 48 D0 3F  .]y...d.x..Q.H.?
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.309 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AE 77 EF D8 D6 45 3C 52 E9 A9 98 07 EB 08 BF D6 42 B8 A4 44 3C E9 7C A7 27 32 06 1A B7 3B 1B 91",
#   "session id"          : "54 3E 40 E6 64 AE BB 7B C2 EC BC 40 C5 90 CC ED DF AB BC 60 02 30 9D 2F B2 36 DD DD 8F DA F6 6F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F1 68 10 CC 33 0E 0C 50   E4 8F 6C 77 F5 79 20 34  .h..3..P..lw.y 4
#           0010: AD BE FF C8 02 97 F8 91   B5 AD EC FC 27 D9 F3 50  ............'..P
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.309 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.309 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.310 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.311 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.311 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.312 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.313 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.315 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.315 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.315 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.315 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.315 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.315 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:04.317 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:04.317 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.333 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.334 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.335 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.339 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.339 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.339 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.340 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.340 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:04.340 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:04.340 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.341 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.342 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.342 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.342 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.343 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.343 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:04.343 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.350 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 1B 0E C3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 22:57:45.000 UTC",
#       "not  after"         : "2024-01-15 22:57:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#           0010: 4E 90 EE 56                                        N..V
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D1 66 37 FB E3 32 56 58   AC 05 7F 10 F9 88 FB 9E  .f7..2VX........
#           0010: FD 1A 3A FB                                        ..:.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.350 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.558 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 98 C4 D8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 22:57:42.000 UTC",
#     "not  after"         : "2024-01-15 22:57:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 88 10 7F DA 9B 7B 89   A8 33 C3 AE E0 DF 27 A5  .........3....'.
#         0010: 91 92 DF 4A                                        ...J
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#         0010: 4E 90 EE 56                                        N..V
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.566 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A6 E8 32 EC B9 96 CD 0F   38 73 8D 24 7A 05 6A BE  ..2.....8s.$z.j.
#     0010: 81 40 F2 2A 91 5A 2D 34   A9 F6 A1 83 22 A3 F3 2B  .@.*.Z-4...."..+
#     0020: 67 D4 47 0E E8 DB E1 7E   6D 89 07 4B D8 53 D4 DC  g.G.....m..K.S..
#     0030: 92 B9 0A 49 32 F9 3B 88   B7 30 2C 21 73 38 4C 4F  ...I2.;..0,!s8LO
#     0040: 76 AA D7 E7 C7 A4 05 09   F2 85 C7 9E 86 CB 1E F5  v...............
#     0050: 86 EB DC 98 6C 50 4A 7D   A2 FB 4C C4 AA 13 6D 11  ....lPJ...L...m.
#     0060: 31 41 53 80 C1 EB 06 08   E2 74 2C 0B 75 0A 0A BB  1AS......t,.u...
#     0070: 21 9E 4C 9C 27 57 BC 24   4D 78 07 A9 7D F8 D1 19  !.L.'W.$Mx......
#     0080: E7 BB 19 E8 5B 2F EE 8D   8F 52 12 46 4C CF 1A 8D  ....[/...R.FL...
#     0090: 7D 05 9E 37 16 3A 5D C6   42 2E 46 9A FB 6D 96 40  ...7.:].B.F..m.@
#     00A0: 15 ED AF EF BC 6C C7 E1   48 4D 83 7B 77 A4 13 A4  .....l..HM..w...
#     00B0: E5 AB 86 77 D8 46 A7 56   F3 CB E2 23 89 53 69 4A  ...w.F.V...#.SiJ
#     00C0: 30 20 5B C8 56 D2 0B 94   FE 34 42 77 88 1F C0 22  0 [.V....4Bw..."
#     00D0: 74 76 80 17 52 6F 7C 14   8A 34 43 AF 3B DA 43 13  tv..Ro...4C.;.C.
#     00E0: FC CD 55 6C 97 BE 15 31   36 DF 65 9F 3D E3 BE 08  ..Ul...16.e.=...
#     00F0: 4E 75 A6 8F E9 0D 24 05   D1 AF FB BE 36 F9 ED 4D  Nu....$.....6..M
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.569 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E0 C6 57 CA DB 8A 15 62   02 F4 EF 8F 18 AA 97 FE  ..W....b........
#     0010: 3F 56 3F 49 A5 02 AB D5   C5 D1 88 8C EE 8E 34 56  ?V?I..........4V
#     0020: 37 AC 05 D4 3C 1E 3D 8A   B3 75 96 A8 14 8F F9 EF  7...<.=..u......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.573 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 22:58:04.586 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:04.586 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 22:58:04.586 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:04.586 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 22:58:04.586 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:04.586 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.587 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.596 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 65 66 5C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 22:57:49.000 UTC",
#       "not  after"         : "2024-01-15 22:57:49.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#           0010: 4E 90 EE 56                                        N..V
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 60 7E B4 A8 53 D6 9E   07 71 7E A7 B1 43 5D E7  .`...S...q...C].
#           0010: AC 54 F9 98                                        .T..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 98 C4 D8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 22:57:42.000 UTC",
#       "not  after"         : "2024-01-15 22:57:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 88 10 7F DA 9B 7B 89   A8 33 C3 AE E0 DF 27 A5  .........3....'.
#           0010: 91 92 DF 4A                                        ...J
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#           0010: 4E 90 EE 56                                        N..V
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.676 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8C 9F 70 FB B1 B7 A6 CD   89 B9 55 84 FD 10 F2 9A  ..p.......U.....
#     0010: 77 02 BB CA 10 A9 64 9D   32 75 85 02 F8 63 4C AF  w.....d.2u...cL.
#     0020: 8A F9 4E 0A 4B 04 41 3F   B4 46 EB D6 6C 07 43 75  ..N.K.A?.F..l.Cu
#     0030: 72 F5 EC 49 FF 68 0D 17   90 FF 67 6B AF C6 D0 DC  r..I.h....gk....
#     0040: 4E DC 91 E5 E5 C0 2D 95   21 89 60 DD BB 82 E1 15  N.....-.!.`.....
#     0050: FA F2 31 75 EB DA 2F 65   2F C6 D3 DF C1 14 95 35  ..1u../e/......5
#     0060: DC 5A 72 30 15 9B 63 7F   32 22 26 57 F9 B0 C3 9A  .Zr0..c.2"&W....
#     0070: D6 39 0E C3 F9 BB 57 D1   7E B8 E9 B8 FF 26 91 81  .9....W......&..
#     0080: A2 A2 72 A4 A2 00 58 A0   4B 9E DA 87 D8 66 9F 9A  ..r...X.K....f..
#     0090: 7A E8 4E 34 B9 4E 24 6F   94 7D 4C EF C5 F8 F1 55  z.N4.N$o..L....U
#     00A0: AF 04 9B F2 C4 16 0A E4   06 4F 3E F5 20 5F DA BC  .........O>. _..
#     00B0: 1F 6D 5C 1A 97 BC 59 1D   AA A9 7D C7 A5 7E 30 64  .m\...Y.......0d
#     00C0: 54 C7 EB 37 D9 D9 73 3A   FF EE 62 65 4A 41 B6 62  T..7..s:..beJA.b
#     00D0: 6C 41 49 FB D5 03 51 4F   10 46 8D 3F 0E 23 21 29  lAI...QO.F.?.#!)
#     00E0: F2 7A 52 C4 8C 81 EC F7   ED 85 BC 4A 04 0D 1E D7  .zR........J....
#     00F0: 5B 8F D7 E1 8C 62 F9 85   49 4C 34 9C 5C 5D 2F 97  [....b..IL4.\]/.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.677 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7B FD 2A 2E 56 76 23 11   DE 3D C1 70 A6 0C E4 DE  ..*.Vv#..=.p....
#     0010: 32 2C 3A 09 10 77 44 D9   3E 16 E7 95 13 A0 67 CE  2,:..wD.>.....g.
#     0020: 39 85 EA 49 E4 86 A7 2D   C7 0E 43 19 AE 74 AA 1B  9..I...-..C..t..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.678 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 22:58:04.738 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 22:58:04.738 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 22:58:04.738 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 22:58:04.738 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:04.914 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "33 D3 8A 98 FD C9 C0 4A 05 73 86 CC 2B EB FB DC 01 DE FE 79 CE 1A 9A 1E DC 00 C6 69 44 8E F2 F9",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 22:58:05.582 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 22:58:05.585 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-17 22:58:07.422; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 22:58:07.427; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 22:58:07.927; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-PjjjDx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PjjjDx/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 22:58:07.930; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-PjjjDx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PjjjDx/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 22:58:07.932; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5b970f7(ca,h=[localhost],a=[],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-PjjjDx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PjjjDx/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 22:58:07.968 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 65 66 5C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 22:57:49.000 UTC",
#     "not  after"         : "2024-01-15 22:57:49.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#         0010: 4E 90 EE 56                                        N..V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 60 7E B4 A8 53 D6 9E   07 71 7E A7 B1 43 5D E7  .`...S...q...C].
#         0010: AC 54 F9 98                                        .T..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 98 C4 D8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 22:57:42.000 UTC",
#     "not  after"         : "2024-01-15 22:57:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 88 10 7F DA 9B 7B 89   A8 33 C3 AE E0 DF 27 A5  .........3....'.
#         0010: 91 92 DF 4A                                        ...J
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#         0010: 4E 90 EE 56                                        N..V
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 22:58:07.972 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 98 C4 D8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 22:57:42.000 UTC",
#     "not  after"         : "2024-01-15 22:57:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 88 10 7F DA 9B 7B 89   A8 33 C3 AE E0 DF 27 A5  .........3....'.
#         0010: 91 92 DF 4A                                        ...J
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#         0010: 4E 90 EE 56                                        N..V
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 A5 B0 DF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 22:57:40.000 UTC",
#     "not  after"         : "2024-01-15 22:57:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 88 10 7F DA 9B 7B 89   A8 33 C3 AE E0 DF 27 A5  .........3....'.
#         0010: 91 92 DF 4A                                        ...J
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 22:58:07.984 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 22:58:08.270 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:08.270 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 22:58:08.271 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 22:58:08.272 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:08.276 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:08.288 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:08.288 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:08.288 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:08.290 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A4 FA F1 FF 72 98 03 53 78 8C 0F FE B9 91 19 0A 8C 31 2D 60 04 DC 1B 43 55 2D 56 50 59 FE 73 2C",
#   "session id"          : "58 DA 71 20 73 B3 CE 4A FC C2 F2 34 6E DE FC 61 B9 1C AA C1 A2 09 A6 A2 BA 60 C4 AA B6 8F CC 39",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 39 97 0C D8 E2 37 3E F2   99 02 36 79 35 3E 1C F5  9....7>...6y5>..
#             0010: 0F 25 24 9A 0D 3E 66 67   D2 E2 70 57 7D 99 EF 51  .%$..>fg..pW...Q
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.374 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8A C1 71 13 90 3B 03 A6 3B D8 85 96 A6 F4 A1 EF 98 0A F9 1A CA A9 F9 79 5C 72 BE 04 E1 8C 52 D8",
#   "session id"          : "58 DA 71 20 73 B3 CE 4A FC C2 F2 34 6E DE FC 61 B9 1C AA C1 A2 09 A6 A2 BA 60 C4 AA B6 8F CC 39",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4A 86 9E 07 11 12 2B F4   A7 BE 25 80 06 28 2A A3  J.....+...%..(*.
#           0010: B1 07 B9 E8 24 07 45 2E   4E 5E 00 88 11 19 8C 40  ....$.E.N^.....@
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.374 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.375 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.376 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.376 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.377 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.377 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.377 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.377 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.378 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.378 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.381 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.388 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.388 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.388 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.389 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.389 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:08.390 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:08.390 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.404 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.406 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.407 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.418 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.418 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.418 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.421 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.421 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.421 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:08.422 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:08.422 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.424 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.424 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.424 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.425 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.426 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.426 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:08.427 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.432 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 1B 0E C3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 22:57:45.000 UTC",
#       "not  after"         : "2024-01-15 22:57:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#           0010: 4E 90 EE 56                                        N..V
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D1 66 37 FB E3 32 56 58   AC 05 7F 10 F9 88 FB 9E  .f7..2VX........
#           0010: FD 1A 3A FB                                        ..:.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.432 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.486 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 98 C4 D8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 22:57:42.000 UTC",
#     "not  after"         : "2024-01-15 22:57:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 88 10 7F DA 9B 7B 89   A8 33 C3 AE E0 DF 27 A5  .........3....'.
#         0010: 91 92 DF 4A                                        ...J
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#         0010: 4E 90 EE 56                                        N..V
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.489 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 03 60 C5 48 E4 96 39 9B   2B AF A1 5F 9A 6C B3 9F  .`.H..9.+.._.l..
#     0010: 64 B4 1A C0 B8 AE 0F 97   50 1A 01 7C EA E0 21 31  d.......P.....!1
#     0020: DE 81 39 43 86 05 47 1E   2F B1 9E 82 39 3F 75 0E  ..9C..G./...9?u.
#     0030: FE 59 DA 9A 74 E8 B0 A9   28 41 15 C8 0C E1 2D 13  .Y..t...(A....-.
#     0040: 09 7F C7 6A 77 F5 3C D5   02 1A 56 A4 B4 8D 19 12  ...jw.<...V.....
#     0050: 4F 96 A1 46 76 E6 1F 44   A4 4A 7F F8 4D 19 33 DC  O..Fv..D.J..M.3.
#     0060: B0 66 6B 61 3E 3A 29 CE   56 C8 E6 E5 59 73 A5 0C  .fka>:).V...Ys..
#     0070: 40 50 AE 8D B3 92 05 7F   F7 C4 B4 EC 9C B1 15 72  @P.............r
#     0080: 6B B3 DC 10 A0 AD 73 4F   D2 2E 26 CD DA D0 65 DE  k.....sO..&...e.
#     0090: 7F 75 0C 8F 78 A4 D0 CF   C1 4F EB 0E 0E D5 7F 8D  .u..x....O......
#     00A0: 50 CD F7 1B 52 7D 76 E0   5A CB 55 7F 4F 7C 65 8F  P...R.v.Z.U.O.e.
#     00B0: 29 4B 86 1E B3 5F 27 A6   5F C6 0D 20 33 AB 24 19  )K..._'._.. 3.$.
#     00C0: 60 B2 1A FF 47 72 35 71   5E D9 EE 74 8D 45 CC F1  `...Gr5q^..t.E..
#     00D0: 7E B8 36 15 1B D0 0F CE   46 E6 84 C5 CB BC EC 96  ..6.....F.......
#     00E0: B9 FF 95 A5 59 B3 88 CC   93 B8 01 C3 9E 4C AA 5E  ....Y........L.^
#     00F0: 5D 9D 62 BA 3C 2A 52 DB   51 93 93 8E 26 B6 F4 73  ].b.<*R.Q...&..s
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.490 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4A FE B7 06 EF 69 81 5D   6B A1 6E 56 40 DD 4E 36  J....i.]k.nV@.N6
#     0010: 32 A4 3D 06 B3 E3 AE D7   23 89 E5 34 CE D5 D8 33  2.=.....#..4...3
#     0020: 41 28 72 4E 9D 54 C5 E2   33 FC F5 D8 B1 44 02 50  A(rN.T..3....D.P
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.492 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 22:58:08.493 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:08.493 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 22:58:08.493 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:08.493 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 22:58:08.493 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:08.493 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.494 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.495 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 65 66 5C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 22:57:49.000 UTC",
#       "not  after"         : "2024-01-15 22:57:49.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#           0010: 4E 90 EE 56                                        N..V
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 60 7E B4 A8 53 D6 9E   07 71 7E A7 B1 43 5D E7  .`...S...q...C].
#           0010: AC 54 F9 98                                        .T..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 98 C4 D8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 22:57:42.000 UTC",
#       "not  after"         : "2024-01-15 22:57:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 88 10 7F DA 9B 7B 89   A8 33 C3 AE E0 DF 27 A5  .........3....'.
#           0010: 91 92 DF 4A                                        ...J
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#           0010: 4E 90 EE 56                                        N..V
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.521 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3E 71 F2 B7 19 33 05 40   12 01 07 EB E8 22 8F C0  >q...3.@....."..
#     0010: 64 B6 77 71 37 45 B2 97   4B 64 57 BC 32 35 21 2B  d.wq7E..KdW.25!+
#     0020: 4D D8 CD 8B 59 22 8A AC   46 81 E1 18 42 90 2C FC  M...Y"..F...B.,.
#     0030: D4 D9 BA 4C 9A A3 93 A2   9A 5C FC EF 4D A3 2D 7E  ...L.....\..M.-.
#     0040: DD 99 63 D8 2B 8E CA F7   9A F4 48 47 4F 91 5F 1F  ..c.+.....HGO._.
#     0050: E4 04 12 A4 E9 BF 07 14   ED DE 3B 1A 17 7C CC E0  ..........;.....
#     0060: F9 7B CE B2 AF 59 23 9C   7A D3 D2 ED F0 C4 AE 50  .....Y#.z......P
#     0070: 69 61 33 8B BC 44 39 16   1E 96 BB 92 15 F3 FA 8A  ia3..D9.........
#     0080: 28 3E 56 8F A1 83 0C C6   CB 58 21 AC 69 70 95 FE  (>V......X!.ip..
#     0090: E2 4D 3A 73 6E 6B DE 51   67 38 B2 ED 20 FA B9 B8  .M:snk.Qg8.. ...
#     00A0: F8 AB 2E D3 0C C1 E4 FE   50 22 EC CF 5F 95 9E AB  ........P".._...
#     00B0: 91 85 47 02 B6 55 DE 61   7F 4D 3A B9 DE 26 D5 9C  ..G..U.a.M:..&..
#     00C0: 10 F6 18 D4 F6 D5 FF 18   6D 5E AB D0 E8 6E 70 EE  ........m^...np.
#     00D0: E4 B9 4E EC 18 AB C8 79   ED 33 FF E5 DE 21 6C 9E  ..N....y.3...!l.
#     00E0: 0A 2B 6D A2 EF AB F6 93   24 79 FD 6F C2 96 5A 78  .+m.....$y.o..Zx
#     00F0: 9C B3 14 08 0B FC C8 8B   74 C7 44 21 C2 28 18 C3  ........t.D!.(..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.522 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FF FC 40 25 C3 E4 77 AB   A2 33 B8 86 46 6B F2 0C  ..@%..w..3..Fk..
#     0010: 84 EF AA 11 12 DE FB 3E   B6 46 E1 7E 4E D9 62 76  .......>.F..N.bv
#     0020: 1D 23 4E A9 0C 99 37 B3   6B 59 FE 4B 2D 03 6A 4D  .#N...7.kY.K-.jM
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.523 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:08.581 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "90 66 C8 D9 39 85 72 E4 FD BB E7 19 9F 4A 08 5B 98 4B 39 B5 53 80 3E B8 1E 61 CC D5 F4 7D 57 D3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 22:58:08.922 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 22:58:08.923 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-17 22:58:22.439; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-17 22:58:22.811 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 98 C4 D8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 22:57:42.000 UTC",
#       "not  after"         : "2024-01-15 22:57:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 88 10 7F DA 9B 7B 89   A8 33 C3 AE E0 DF 27 A5  .........3....'.
#           0010: 91 92 DF 4A                                        ...J
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 F8 27 C1 0B A1 82 92   51 01 85 C3 BA 85 7A 53  ..'.....Q.....zS
#           0010: 4E 90 EE 56                                        N..V
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 A5 B0 DF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 22:57:40.000 UTC",
#       "not  after"         : "2024-01-15 22:57:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 88 10 7F DA 9B 7B 89   A8 33 C3 AE E0 DF 27 A5  .........3....'.
#           0010: 91 92 DF 4A                                        ...J
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-17 22:58:22.824 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 22:58:22.984 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:22.984 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 22:58:22.986 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 22:58:22.986 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:22.990 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:23.002 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:23.002 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:23.002 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 22:58:23.004 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "5A 64 B9 E3 5C 0E C8 F0 13 C4 80 B1 58 C4 1B 24 47 35 2F BA 34 7C 53 4B 76 14 55 2C 69 3B 37 26",
#     "session id"          : "D9 25 EB DF 34 F1 D3 34 85 81 6C C6 D8 E8 08 D2 33 F3 D2 38 6C 59 7E 1A 40 4F D4 FF D8 DF F4 1E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 82 58 DF 1C 52 7E 60 74   36 13 B4 1D 22 E9 F7 29  .X..R.`t6..."..)
#               0010: A6 40 1C D2 34 08 B9 1C   C5 EE 0E 08 92 FD 24 5A  .@..4.........$Z
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.026 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "C8 C7 F6 3D C8 FA E5 10 61 1B 52 50 B4 92 1F 00 64 0A CE 68 67 D7 B3 56 B9 27 58 7B DD D2 93 F2",
#     "session id"          : "D9 25 EB DF 34 F1 D3 34 85 81 6C C6 D8 E8 08 D2 33 F3 D2 38 6C 59 7E 1A 40 4F D4 FF D8 DF F4 1E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 31 53 02 86 2A EA 01 A8   2E 4A 38 55 6D 16 41 FC  1S..*....J8Um.A.
#             0010: 45 54 5F 98 9E 0E 33 10   8D 6A 09 72 37 96 CB 42  ET_...3..j.r7..B
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.026 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.026 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.027 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.027 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.027 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.027 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.027 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.027 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.027 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.027 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.029 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.029 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.029 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.030 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.030 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.030 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.030 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.030 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.030 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.030 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:23.030 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:58:23.030 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.030 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.030 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.036 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.042 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.044 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.047 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.047 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.048 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.048 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 22:58:23.048 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-1

[...truncated too long message...]

ity.AccessController.doPrivileged(Native Method)
#   	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 22:59:40.814 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:46086/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14692ms
ok 65 stop command for single port in 20602ms
ok 66 status detects locally running solr in 7838ms
ok 67 status does not expose cli parameters to end user in 269ms
ok 68 listing out files in 2703ms
ok 69 copying files around in 6867ms
ok 70 upconfig in 2669ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1253ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1264ms
ok 73 Cleanup in 1272ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 3m 15s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/a3culg35trxgc

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 846 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/846/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.classMethod

Error Message:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).

Stack Trace:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
	at __randomizedtesting.SeedInfo.seed([6FA2FB8C9326350]:0)




Build Log:
[...truncated 34824 lines...]
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-17 18:32:42.950; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 18:32:46.340; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 5679ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-17 18:32:48.637; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 18:32:52.006; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2317ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-17 18:32:54.342; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 18:32:54.398; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 3521ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-17 18:32:56.738; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 18:32:57.898; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 25668ms
ok 19 Check export command in 22898ms
ok 20 export fails on non cloud mode in 10683ms
ok 21 using curl to extract a single pdf file in 18457ms
ok 22 using the bin/solr post tool to extract content from pdf in 20659ms
ok 23 using the bin/solr post tool to crawl web site in 18867ms
ok 24 healthcheck on cloud solr in 31327ms
ok 25 start help flag prints help in 184ms
ok 26 stop help flag prints help in 172ms
ok 27 restart help flag prints help in 176ms
ok 28 status help flag prints help in 55ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 167ms
ok 30 create help flag prints help in 165ms
ok 31 createcore help flag prints help in 171ms
ok 32 createcollection help flag prints help in 171ms
ok 33 delete help flag prints help in 167ms
ok 34 version help flag prints help in 54ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 173ms
ok 36 auth help flag prints help in 173ms
ok 37 assert help flag prints help in 953ms
ok 38 post help flag prints help in 974ms
ok 39 SQL Module in 16867ms
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19007ms
ok 41 icu collation in analysis-extras module in 14184ms
not ok 42 package detects no running solr in 1369ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 26225 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 26225 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9967ms
not ok 44 deploying and undeploying a collection level package in 196408ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 45117 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45117 (pid=10885). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 11432ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-17 18:39:59.473; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 18:39:59.525; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-17 18:40:00.567; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 18:40:00.628; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 15036ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-17 18:40:11.206; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 18:40:13.477; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-17 18:40:14.508; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 18:40:15.670; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3777ms
not ok 48 basic post with a type specified in 1364ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1257ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1270ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1256ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1376ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1383ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1375ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 4773ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-17 18:40:43.674; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 18:40:44.830; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 4635ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-17 18:40:47.235; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 18:40:49.491; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10229ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:45117/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-SuhVNi%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-17 18:40:59.798; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 18:40:59.851; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:45117/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-SuhVNi%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12722ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 45117 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45117 (pid=17158). Happy searching!
#
#     INFO  - 2023-10-17 18:41:07.294; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 18:41:07.298; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 18:41:07.819; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-SuhVNi/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-SuhVNi/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-17 18:41:10.706; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-17 18:41:10.710; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-17 18:41:12.301; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 18:41:12.306; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13153ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 45117 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45117 (pid=17735). Happy searching!
#
#     INFO  - 2023-10-17 18:41:20.053; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 18:41:20.057; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 18:41:20.514; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-SuhVNi/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-SuhVNi/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 18:41:20.633; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-SuhVNi/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-SuhVNi/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 18:41:20.634; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-SuhVNi/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-SuhVNi/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-17 18:41:23.944; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-17 18:41:23.949; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-17 18:41:24.387; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-SuhVNi/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-SuhVNi/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-17 18:41:24.388; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-SuhVNi/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-SuhVNi/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-17 18:41:25.492; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 18:41:25.497; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-17 18:41:25.941; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-SuhVNi/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-SuhVNi/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 18:41:25.943; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-SuhVNi/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-SuhVNi/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10893ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 45117 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45117 (pid=18336). Happy searching!
#
#     INFO  - 2023-10-17 18:41:33.387; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 18:41:33.390; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-17 18:41:36.405; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 18:41:36.409; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13919ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-17 18:41:45.084; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-17 18:41:48.810; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-17 18:41:50.341; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 42424ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-SuhVNi/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 45117 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45117 (pid=19925). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 45118 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45118 (pid=20037). Happy searching!
#
#     INFO  - 2023-10-17 18:42:15.592; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 18:42:15.598; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 18:42:16.488; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-SuhVNi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SuhVNi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 18:42:16.490; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-SuhVNi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SuhVNi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 18:42:16.491; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(ca,h=[localhost],a=[],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-SuhVNi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SuhVNi/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 18:42:16.576 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 76 16 27",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 18:42:02.000 UTC",
#     "not  after"         : "2024-01-15 18:42:02.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 77 66 35 C0 A4 47 BE   02 BE 5D 79 D7 92 97 1D  Lwf5..G...]y....
#         0010: F5 37 A1 A5                                        .7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 1C 75 18 0E D4 41 E5   96 3A 3E C3 1B AE 75 3B  ..u...A..:>...u;
#         0010: BC 4C 7C 54                                        .L.T
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C FC ED E3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 18:41:55.000 UTC",
#     "not  after"         : "2024-01-15 18:41:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 E5 85 2C BB C4 08 56   61 90 AD 76 65 1B 2D 6E  ...,...Va..ve.-n
#         0010: 40 F2 E1 44                                        @..D
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 77 66 35 C0 A4 47 BE   02 BE 5D 79 D7 92 97 1D  Lwf5..G...]y....
#         0010: F5 37 A1 A5                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 18:42:16.585 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 71 6B 4A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 18:41:53.000 UTC",
#     "not  after"         : "2024-01-15 18:41:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 E5 85 2C BB C4 08 56   61 90 AD 76 65 1B 2D 6E  ...,...Va..ve.-n
#         0010: 40 F2 E1 44                                        @..D
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C FC ED E3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 18:41:55.000 UTC",
#     "not  after"         : "2024-01-15 18:41:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 E5 85 2C BB C4 08 56   61 90 AD 76 65 1B 2D 6E  ...,...Va..ve.-n
#         0010: 40 F2 E1 44                                        @..D
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 77 66 35 C0 A4 47 BE   02 BE 5D 79 D7 92 97 1D  Lwf5..G...]y....
#         0010: F5 37 A1 A5                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 18:42:16.612 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 18:42:16.917 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 18:42:16.918 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 18:42:16.924 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 18:42:16.924 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 18:42:16.935 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 18:42:16.952 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 18:42:16.952 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 18:42:16.952 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 18:42:16.959 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E3 05 5C AD 1F 61 FA 97 D8 20 38 3F 5A 65 9A AC F5 2F 7B CE FC FB 53 C9 5D BF 76 D7 88 89 F5 2D",
#   "session id"          : "E7 AC 7B E1 10 67 AB 7B 7E 33 A8 41 F8 EF 24 F7 D7 9B 9E A8 1F 15 05 BD BC 9F C1 64 AE B9 14 C3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 94 F5 C5 CD D7 D6 29 4F   89 FA 47 06 9F 4D 30 A8  ......)O..G..M0.
#             0010: E9 8D C0 5A 94 15 B7 81   A4 11 07 B9 F4 D9 28 2A  ...Z..........(*
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.556 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "14 46 CA 30 71 B4 97 A8 8E AD DB A0 48 ED 06 66 B4 4E 3E C1 84 14 4D 48 FD 2F 79 4D 93 5D A0 C2",
#   "session id"          : "E7 AC 7B E1 10 67 AB 7B 7E 33 A8 41 F8 EF 24 F7 D7 9B 9E A8 1F 15 05 BD BC 9F C1 64 AE B9 14 C3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: DC 74 21 EF 7E BB 1C 28   94 CD C4 A1 C2 BE C8 81  .t!....(........
#           0010: BA 99 29 CD 3E BD 34 26   E9 39 AD 78 CE B6 60 75  ..).>.4&.9.x..`u
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.556 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.556 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.559 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.559 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.560 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.560 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.560 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.560 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.561 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.561 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.567 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.573 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.573 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.573 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.573 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.573 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.573 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.573 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.573 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.574 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 18:42:17.574 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 18:42:17.574 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.574 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.574 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.594 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.595 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.596 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.600 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.600 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.600 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.612 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.612 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.612 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.613 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 18:42:17.614 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 18:42:17.614 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.616 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.616 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.616 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.619 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.619 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.620 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 18:42:17.620 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.633 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 60 30 68",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 18:41:58.000 UTC",
#       "not  after"         : "2024-01-15 18:41:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4C 77 66 35 C0 A4 47 BE   02 BE 5D 79 D7 92 97 1D  Lwf5..G...]y....
#           0010: F5 37 A1 A5                                        .7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 F5 CD 61 59 17 39 AB   E6 92 3F 0A 7B CB 06 77  ...aY.9...?....w
#           0010: BB 5F 11 2B                                        ._.+
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.633 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.773 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C FC ED E3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 18:41:55.000 UTC",
#     "not  after"         : "2024-01-15 18:41:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 E5 85 2C BB C4 08 56   61 90 AD 76 65 1B 2D 6E  ...,...Va..ve.-n
#         0010: 40 F2 E1 44                                        @..D
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 77 66 35 C0 A4 47 BE   02 BE 5D 79 D7 92 97 1D  Lwf5..G...]y....
#         0010: F5 37 A1 A5                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.789 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3C DD 4C D4 48 81 7C DB   0C 83 3C 84 F1 13 B1 7D  <.L.H.....<.....
#     0010: 7C C0 25 02 C9 0D 8F E0   63 2C 22 BF 08 4E 60 70  ..%.....c,"..N`p
#     0020: 35 CB B9 6C 65 AD 56 BF   DA 61 44 EB 09 E5 6F 49  5..le.V..aD...oI
#     0030: B0 6D 2D 0A 4E B9 75 72   F8 09 B9 68 F4 48 A6 DE  .m-.N.ur...h.H..
#     0040: 4E 2C 9B C8 43 D8 37 C0   30 4B 2D D1 CC AF FA 90  N,..C.7.0K-.....
#     0050: 0C 48 F7 08 73 BE B8 77   3C B7 D0 10 A0 39 76 3F  .H..s..w<....9v?
#     0060: E8 24 0B 93 05 E0 07 E4   F3 9E 31 CD 55 28 F2 33  .$........1.U(.3
#     0070: F6 FE F2 81 B4 70 95 5D   98 AA 93 4D 42 C8 CD 74  .....p.]...MB..t
#     0080: EC 56 FB 4C 60 20 89 08   5F D9 10 56 7C 5E 4E E8  .V.L` .._..V.^N.
#     0090: 2C 1D 82 07 8B AC D1 0C   83 9E 13 54 DC 4A 81 2A  ,..........T.J.*
#     00A0: 15 7F 21 3B CB 10 65 7C   6E 44 15 C4 38 11 BC 22  ..!;..e.nD..8.."
#     00B0: 7E BC 56 6D FD BD 3C 65   47 FB 4C 93 FB E8 E3 38  ..Vm..<eG.L....8
#     00C0: 27 C7 02 82 76 44 1E 7D   68 2E 42 2F 63 58 F5 0B  '...vD..h.B/cX..
#     00D0: CE 62 ED 0E 03 98 E0 C1   5A 02 28 B9 74 89 E3 56  .b......Z.(.t..V
#     00E0: FA 3B 9F B4 4B 2D 83 2F   27 1C CA 9B 81 CE 03 D7  .;..K-./'.......
#     00F0: E1 B3 1A AB 8E BF 30 FB   5D 36 C9 87 79 78 E2 B2  ......0.]6..yx..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.791 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 85 A0 5D 81 B1 E5 D9 D1   9A 8F 03 60 F7 E9 CB CD  ..]........`....
#     0010: B4 DF A6 2C 5F 3B 4F 24   B7 A4 9E 8E 52 EE 04 5F  ...,_;O$....R.._
#     0020: 67 5A 86 8C 14 FE 58 3B   45 27 D1 3E 49 11 81 AA  gZ....X;E'.>I...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.793 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 18:42:17.793 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 18:42:17.794 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 18:42:17.794 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 18:42:17.795 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 18:42:17.797 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 18:42:17.797 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.798 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.800 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 76 16 27",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 18:42:02.000 UTC",
#       "not  after"         : "2024-01-15 18:42:02.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4C 77 66 35 C0 A4 47 BE   02 BE 5D 79 D7 92 97 1D  Lwf5..G...]y....
#           0010: F5 37 A1 A5                                        .7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 1C 75 18 0E D4 41 E5   96 3A 3E C3 1B AE 75 3B  ..u...A..:>...u;
#           0010: BC 4C 7C 54                                        .L.T
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C FC ED E3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 18:41:55.000 UTC",
#       "not  after"         : "2024-01-15 18:41:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 E5 85 2C BB C4 08 56   61 90 AD 76 65 1B 2D 6E  ...,...Va..ve.-n
#           0010: 40 F2 E1 44                                        @..D
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4C 77 66 35 C0 A4 47 BE   02 BE 5D 79 D7 92 97 1D  Lwf5..G...]y....
#           0010: F5 37 A1 A5                                        .7..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:17.846 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2B AD 41 C4 1A 8B AD 59   1E 7E B5 1B 55 2F 28 7B  +.A....Y....U/(.
#     0010: C9 E8 96 5F 20 E3 3E F7   D8 5D 86 76 43 C7 BA A3  ..._ .>..].vC...
#     0020: 0F D6 80 69 04 D2 D4 35   16 D1 B8 AF DA E7 C0 3E  ...i...5.......>
#     0030: 51 12 DB 1F 31 F0 B5 54   30 20 33 72 5D 8D 1E 43  Q...1..T0 3r]..C
#     0040: 5A 4F 7F B5 A2 AE 73 F9   BD EF 71 16 33 F5 46 89  ZO....s...q.3.F.
#     0050: 82 11 35 4B 6E 8E 86 EE   FD 93 25 DC 37 23 5E 94  ..5Kn.....%.7#^.
#     0060: 1B 77 7B 73 52 EB BF 30   23 DC 1B 6E 94 53 B3 D5  .w.sR..0#..n.S..
#     0070: 47 8D 0A F6 04 2E E3 A8   21 C1 AB A7 09 73 0A 1D  G.......!....s..
#     0080: 4F 34 33 A4 B2 91 C3 44   EC BE 99 4D 1E 15 D2 AB  O43....D...M....
#     0090: 92 F3 51 40 DA 69 DA 39   93 4C 5D C9 7F 01 D7 F1  ..Q@.i.9.L].....
#     00A0: DC D0 EF BC AE EE 53 F8   80 12 01 C4 BE 30 62 56  ......S......0bV
#     00B0: D3 35 A8 55 C7 C4 12 53   74 01 59 4B 04 64 59 BD  .5.U...St.YK.dY.
#     00C0: DB 3B 3C 3D D0 5C 3C 0F   0E 23 00 89 A8 75 39 0A  .;<=.\<..#...u9.
#     00D0: F9 77 FC 10 4B 1C 3F 71   92 AA 89 77 76 3D 74 F6  .w..K.?q...wv=t.
#     00E0: 53 77 89 E1 21 23 08 77   83 FD E9 61 DE 3F 80 16  Sw..!#.w...a.?..
#     00F0: 69 39 0D 17 A9 0B 3A AC   AE 7F 40 F7 76 4F 95 78  i9....:...@.vO.x
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:18.124 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8D D3 B3 62 C2 E6 47 FA   2F A2 AD 6D ED F4 15 43  ...b..G./..m...C
#     0010: 8B E8 E5 4F 46 79 A4 68   85 D9 EF 61 71 24 CC 96  ...OFy.h...aq$..
#     0020: B1 5D CD BA 31 C8 FA 77   FF 3A 5D 99 90 45 2E 47  .]..1..w.:]..E.G
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:18.129 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 18:42:18.194 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5C 13 20 8C 5F A1 5B 3B BF AC B8 40 3D 76 27 5B 87 43 84 2D C2 BF F3 85 04 52 32 24 55 73 1D BD",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 18:42:18.843 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 18:42:18.843 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 18:42:18.843 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 18:42:18.844 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-17 18:42:18.900 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 18:42:18.900 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-17 18:42:21.279; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 18:42:21.283; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 18:42:21.642; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-SuhVNi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SuhVNi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 18:42:21.645; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6175619b(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-SuhVNi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SuhVNi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 18:42:21.645; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2f058b8a(ca,h=[localhost],a=[],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-SuhVNi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SuhVNi/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 18:42:21.852 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 76 16 27",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 18:42:02.000 UTC",
#     "not  after"         : "2024-01-15 18:42:02.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 77 66 35 C0 A4 47 BE   02 BE 5D 79 D7 92 97 1D  Lwf5..G...]y....
#         0010: F5 37 A1 A5                                        .7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 1C 75 18 0E D4 41 E5   96 3A 3E C3 1B AE 75 3B  ..u...A..:>...u;
#         0010: BC 4C 7C 54                                        .L.T
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C FC ED E3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 18:41:55.000 UTC",
#     "not  after"         : "2024-01-15 18:41:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 E5 85 2C BB C4 08 56   61 90 AD 76 65 1B 2D 6E  ...,...Va..ve.-n
#         0010: 40 F2 E1 44                                        @..D
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 77 66 35 C0 A4 47 BE   02 BE 5D 79 D7 92 97 1D  Lwf5..G...]y....
#         0010: F5 37 A1 A5                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 18:42:21.856 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 71 6B 4A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 18:41:53.000 UTC",
#     "not  after"         : "2024-01-15 18:41:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 E5 85 2C BB C4 08 56   61 90 AD 76 65 1B 2D 6E  ...,...Va..ve.-n
#         0010: 40 F2 E1 44                                        @..D
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C FC ED E3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 18:41:55.000 UTC",
#     "not  after"         : "2024-01-15 18:41:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 E5 85 2C BB C4 08 56   61 90 AD 76 65 1B 2D 6E  ...,...Va..ve.-n
#         0010: 40 F2 E1 44                                        @..D
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 77 66 35 C0 A4 47 BE   02 BE 5D 79 D7 92 97 1D  Lwf5..G...]y....
#         0010: F5 37 A1 A5                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 18:42:21.868 UTC|SSLCipher.java:464|jdk.tls.ke

[...truncated too long message...]

cConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C 08 FE AF F9 AF 70 42   A5 A6 FB 1C E5 1A 5B 93  <.....pB......[.
#         0010: 86 8E A9 A3                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 91 F7 D0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 18:42:38.000 UTC",
#     "not  after"         : "2024-01-15 18:42:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C 08 FE AF F9 AF 70 42   A5 A6 FB 1C E5 1A 5B 93  <.....pB......[.
#         0010: 86 8E A9 A3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 D2 36 F9 D7 C1 E8 83   54 FC 80 B8 6E 0B A1 DE  %.6.....T...n...
#         0010: 93 86 1C 29                                        ...)
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 18:43:06.992 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 15368ms
ok 65 stop command for single port in 17730ms
not ok 66 status detects locally running solr in 3719ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 25909 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 25909 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 259ms
ok 68 listing out files in 2778ms
ok 69 copying files around in 14256ms
ok 70 upconfig in 3872ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1232ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1227ms
not ok 73 Cleanup in 4720ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 25909 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 25909 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.classMethod (:solr:modules:hdfs)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.classMethod" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6FA2FB8C9326350 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 3h 1m 34s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/s3huysygfd4qw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 845 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/845/

All tests passed

Build Log:
[...truncated 1208 lines...]
# ERROR: Error from server at http://localhost:36091/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=javabin&version=2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 46 Random placement plugin using ENV in 16016ms
ok 47 Check help command in 4715ms
ok 48 basic post with a type specified in 5719ms
ok 49 basic post WITHOUT a type specified in 11520ms
ok 50 crawling a directory in 4640ms
ok 51 crawling a web site in 4785ms
ok 52 commit and optimize and delete in 3929ms
ok 53 args mode in 6511ms
ok 54 stdin mode in 3371ms
ok 55 post solr log into solr via script in 9894ms
ok 56 post solr log into solr via cli in 7147ms
ok 57 allowPaths - backup in 17046ms
ok 58 start solr with ssl in 18029ms
not ok 59 use different hostname when not checking peer-name in 20522ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 36091 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36091 (pid=3091285). Happy searching!
#
#     INFO  - 2023-10-17 13:34:22.882; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 13:34:22.887; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 13:34:23.320; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-bBhIoa/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-bBhIoa/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 13:34:23.433; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-bBhIoa/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-bBhIoa/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 13:34:23.433; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-bBhIoa/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-bBhIoa/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-17 13:34:33.409; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-17 13:34:33.414; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-17 13:34:33.785; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-bBhIoa/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-bBhIoa/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:36091/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-17 13:34:35.179; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 13:34:35.184; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-17 13:34:35.963; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 13:34:35.999; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 16955ms
ok 61 start solr with client truststore and security manager in 19610ms
not ok 62 start solr with mTLS needed in 52019ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-bBhIoa/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 36091 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36091 (pid=3093965). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 36092 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 36092 (pid=3094079). Happy searching!
#
#     INFO  - 2023-10-17 13:35:38.709; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 13:35:38.714; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 13:35:39.573; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-bBhIoa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bBhIoa/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 13:35:39.576; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6175619b(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-bBhIoa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bBhIoa/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 13:35:39.577; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2f058b8a(ca,h=[localhost],a=[],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-bBhIoa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bBhIoa/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 13:35:39.634 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 FF 91 53",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 13:35:24.000 UTC",
#     "not  after"         : "2024-01-15 13:35:24.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#         0010: 84 80 4C AC                                        ..L.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 72 ED 0E 07 2E A3 B4   EB 36 40 8E 93 63 B8 13  er.......6@..c..
#         0010: 37 B2 97 3F                                        7..?
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 D8 C6 E9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 13:35:18.000 UTC",
#     "not  after"         : "2024-01-15 13:35:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C E4 A7 CA C4 37 5B FC   4A 22 F3 60 EC 66 FA 56  .....7[.J".`.f.V
#         0010: CD 0E 18 FE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#         0010: 84 80 4C AC                                        ..L.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 13:35:39.639 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 3E 5D AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 13:35:15.000 UTC",
#     "not  after"         : "2024-01-15 13:35:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C E4 A7 CA C4 37 5B FC   4A 22 F3 60 EC 66 FA 56  .....7[.J".`.f.V
#         0010: CD 0E 18 FE                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 D8 C6 E9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 13:35:18.000 UTC",
#     "not  after"         : "2024-01-15 13:35:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C E4 A7 CA C4 37 5B FC   4A 22 F3 60 EC 66 FA 56  .....7[.J".`.f.V
#         0010: CD 0E 18 FE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#         0010: 84 80 4C AC                                        ..L.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 13:35:39.671 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 13:35:40.488 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:40.488 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 13:35:40.490 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 13:35:40.490 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:40.512 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:40.529 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:40.529 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:40.529 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:40.531 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "95 10 50 74 98 22 AF 2C FF 4D 83 8D A1 0B 09 DD 32 38 E4 75 D9 87 03 6A 7D 8A 45 C2 94 AF D8 B4",
#   "session id"          : "BE 62 F5 E8 80 D4 64 F5 FA 99 88 2A C4 A2 EE AE BA 43 F2 B7 5B A4 D1 70 A4 E3 85 16 2A 2E 8A 8E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 62 4E A8 FE C0 C6 C2 06   64 C6 5B 36 9A 11 47 36  bN......d.[6..G6
#             0010: 2F 7E DC B0 88 93 A3 6E   37 F5 D8 F3 A8 0A D8 44  /......n7......D
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 13:35:40.692 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 13:35:40.693 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.693 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "98 D6 F2 F7 1A 09 70 BD 54 9C EC BE 50 91 BA 8E F1 BE BF 5A 58 79 76 44 6C 0D DA 73 F0 BC 8D DB",
#   "session id"          : "BE 62 F5 E8 80 D4 64 F5 FA 99 88 2A C4 A2 EE AE BA 43 F2 B7 5B A4 D1 70 A4 E3 85 16 2A 2E 8A 8E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 71 A3 7B 2F DB 4B 91 DC   5D 73 8E 11 D6 DD DB 7F  q../.K..]s......
#           0010: E1 09 DC 2F E7 CF 6B F1   58 E3 A0 C3 C7 87 0C 12  .../..k.X.......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 13:35:40.693 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 13:35:40.693 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.693 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.693 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.695 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.695 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.695 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.695 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.701 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.701 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.701 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.707 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.707 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:40.707 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:40.707 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.707 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.707 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.720 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.725 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.726 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.730 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.730 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.730 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.730 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.730 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.730 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.730 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:40.734 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:40.734 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.735 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.735 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.735 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.735 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.736 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.737 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:40.737 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.755 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 2F 59 79",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 13:35:20.000 UTC",
#       "not  after"         : "2024-01-15 13:35:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#           0010: 84 80 4C AC                                        ..L.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C4 A5 F2 E6 FC 0B 57 92   C3 8A EE 1E 83 F4 47 3C  ......W.......G<
#           0010: 4F 4B C7 C9                                        OK..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:40.755 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:41.237 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 D8 C6 E9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 13:35:18.000 UTC",
#     "not  after"         : "2024-01-15 13:35:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C E4 A7 CA C4 37 5B FC   4A 22 F3 60 EC 66 FA 56  .....7[.J".`.f.V
#         0010: CD 0E 18 FE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#         0010: 84 80 4C AC                                        ..L.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:41.241 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6A 89 08 4B 59 F9 B0 E1   AC 49 85 51 4A 2F 61 40  j..KY....I.QJ/a@
#     0010: 24 CD B1 FD 9C EE 00 D4   A0 99 3C 1F 10 E4 4F 51  $.........<...OQ
#     0020: C3 43 50 AC B6 FC 09 7F   16 1E 63 01 9E 4A AE 23  .CP.......c..J.#
#     0030: DD 07 06 A8 DC 32 AA BA   8E 6A BA 35 F6 DC 09 16  .....2...j.5....
#     0040: 4C 42 28 9B 04 94 FD 40   E0 84 A5 16 71 80 D1 C9  LB(....@....q...
#     0050: B8 3D E2 0C F8 3D 55 A1   32 25 B6 1F DC D7 53 00  .=...=U.2%....S.
#     0060: F2 5C 3F A0 C6 60 27 AF   BF 29 14 94 96 42 E3 49  .\?..`'..)...B.I
#     0070: B9 84 79 9C F2 F3 79 E5   52 20 62 1F 42 57 3E 4E  ..y...y.R b.BW>N
#     0080: 26 C5 DF B6 5E FE 57 5F   8C AF 8A 45 16 71 4B EA  &...^.W_...E.qK.
#     0090: 52 59 61 A6 0A A3 10 B7   78 BF 56 B0 D0 4C EA F9  RYa.....x.V..L..
#     00A0: 67 69 C9 31 CD 9C 0A C8   69 E7 29 CD BE 57 DA 76  gi.1....i.)..W.v
#     00B0: B6 0A 2E 63 1F BF A9 25   16 BC CF 51 FA AE 07 92  ...c...%...Q....
#     00C0: 9E FE DF 6C 1A 09 FC 58   E6 A6 C8 5B 0A 58 87 FC  ...l...X...[.X..
#     00D0: 34 9F 2D 9C 8C F5 69 8A   91 97 22 82 37 0E AA 0F  4.-...i...".7...
#     00E0: A9 D5 6A A1 09 A0 09 EA   E8 0C 43 1A A2 1A AB C9  ..j.......C.....
#     00F0: 61 0C 5A 89 F7 60 44 B8   8C 12 9F 60 86 9D 33 B2  a.Z..`D....`..3.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:41.249 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4F AC C8 01 B6 27 ED BB   3F 2D 48 94 87 6D 0D C6  O....'..?-H..m..
#     0010: CD 9D 35 2D 45 45 48 4D   53 6F B0 F7 6B 34 33 83  ..5-EEHMSo..k43.
#     0020: 4F 4F E2 59 74 23 E3 07   CF A5 E4 B7 14 2A C9 7B  OO.Yt#.......*..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:41.250 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 13:35:41.251 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:41.251 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 13:35:41.251 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:41.252 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 13:35:41.252 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:41.252 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:41.252 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:41.258 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 FF 91 53",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 13:35:24.000 UTC",
#       "not  after"         : "2024-01-15 13:35:24.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#           0010: 84 80 4C AC                                        ..L.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 72 ED 0E 07 2E A3 B4   EB 36 40 8E 93 63 B8 13  er.......6@..c..
#           0010: 37 B2 97 3F                                        7..?
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 D8 C6 E9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 13:35:18.000 UTC",
#       "not  after"         : "2024-01-15 13:35:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C E4 A7 CA C4 37 5B FC   4A 22 F3 60 EC 66 FA 56  .....7[.J".`.f.V
#           0010: CD 0E 18 FE                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#           0010: 84 80 4C AC                                        ..L.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:41.302 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 12 00 DE 8D EC 20 06 6B   63 3E A3 29 4F C3 FA D5  ..... .kc>.)O...
#     0010: DC 7B 2F D3 EF B4 C0 22   BB 56 5C A2 0F 2F 72 33  ../....".V\../r3
#     0020: F9 10 F2 10 1B 64 86 4B   F7 86 CB 9B E0 0F C5 DE  .....d.K........
#     0030: 99 43 13 08 2F CF B6 5C   CC E0 EB A1 27 8B 77 B6  .C../..\....'.w.
#     0040: 29 FF FE 0E 0D 71 AE 67   35 2F 93 B9 63 58 20 D1  )....q.g5/..cX .
#     0050: 60 71 67 A6 54 A7 3D 30   19 78 13 D8 57 56 CA E4  `qg.T.=0.x..WV..
#     0060: 04 07 FF 04 8D C8 41 A4   A1 3D BE 8B A9 A3 B9 5A  ......A..=.....Z
#     0070: 86 55 E1 30 9B DA B6 72   B1 DB 8B AA F6 4E 24 F7  .U.0...r.....N$.
#     0080: 34 49 11 C2 79 88 FC 60   63 15 89 93 25 C7 8A A4  4I..y..`c...%...
#     0090: 3E AB AE B1 5F B9 16 A8   79 3E 34 1A 4A 04 D2 48  >..._...y>4.J..H
#     00A0: 78 E8 9E C4 DD 6D 83 B5   DB 16 3A 90 D3 5C 63 32  x....m....:..\c2
#     00B0: 7C 8A 76 C5 53 1E 3F 4F   56 E8 65 1A 77 7C E8 39  ..v.S.?OV.e.w..9
#     00C0: 1F 28 0A 5F 12 D5 EF DF   AB 93 E8 DE 36 2C 4C 9C  .(._........6,L.
#     00D0: 88 0C B2 F3 9C 0A 10 84   CD 8B D0 10 3D 8A 8C B4  ............=...
#     00E0: B1 9A D0 74 C6 EC 14 F3   C3 49 F1 FD 8E 16 D9 69  ...t.....I.....i
#     00F0: EC 4D D0 96 FF 98 22 6C   F9 AF BB 14 F4 B6 40 B9  .M...."l......@.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:41.304 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 94 83 94 62 69 7C 2B F7   D7 19 D4 BF 71 A0 3F C8  ...bi.+.....q.?.
#     0010: 74 E1 75 33 1F 8E DB 6A   D6 2E 0B 04 50 E3 79 4A  t.u3...j....P.yJ
#     0020: B8 80 32 10 E5 E0 BE F6   05 D0 55 BF 8A 47 A4 86  ..2.......U..G..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:41.307 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-17 13:35:41.393 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "70 35 C6 C7 3C 98 20 64 87 4C C2 F3 C9 C9 B5 00 54 14 4B AF 39 B5 76 71 98 CA EE 43 75 33 04 26",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 13:35:41.759 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 13:35:41.759 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-17 13:35:43.054; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 13:35:43.060; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 13:35:43.446; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-bBhIoa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bBhIoa/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 13:35:43.448; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-bBhIoa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bBhIoa/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 13:35:43.449; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(ca,h=[localhost],a=[],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-bBhIoa/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bBhIoa/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 13:35:43.486 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 FF 91 53",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 13:35:24.000 UTC",
#     "not  after"         : "2024-01-15 13:35:24.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#         0010: 84 80 4C AC                                        ..L.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 72 ED 0E 07 2E A3 B4   EB 36 40 8E 93 63 B8 13  er.......6@..c..
#         0010: 37 B2 97 3F                                        7..?
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 D8 C6 E9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 13:35:18.000 UTC",
#     "not  after"         : "2024-01-15 13:35:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C E4 A7 CA C4 37 5B FC   4A 22 F3 60 EC 66 FA 56  .....7[.J".`.f.V
#         0010: CD 0E 18 FE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#         0010: 84 80 4C AC                                        ..L.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 13:35:43.490 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 3E 5D AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 13:35:15.000 UTC",
#     "not  after"         : "2024-01-15 13:35:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C E4 A7 CA C4 37 5B FC   4A 22 F3 60 EC 66 FA 56  .....7[.J".`.f.V
#         0010: CD 0E 18 FE                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 D8 C6 E9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 13:35:18.000 UTC",
#     "not  after"         : "2024-01-15 13:35:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C E4 A7 CA C4 37 5B FC   4A 22 F3 60 EC 66 FA 56  .....7[.J".`.f.V
#         0010: CD 0E 18 FE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#         0010: 84 80 4C AC                                        ..L.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 13:35:43.502 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 13:35:43.662 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:43.663 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 13:35:43.664 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 13:35:43.664 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:43.669 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:43.680 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:43.680 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:43.680 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:43.682 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "CD ED D5 30 5B 18 BF 25 E4 57 F6 43 6A B1 FA F1 AC 5B 49 F7 CE 34 7B E1 B6 63 04 69 8D 0C 90 D1",
#   "session id"          : "FB EC C1 7B C5 DB B6 DB 22 13 57 5B 08 27 D0 E6 4F 7C AC A3 6F 6F 67 20 E9 A8 C1 0A 94 00 B1 17",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9F D1 3D 2B 1F 10 4B FD   4D 1A 91 9A 1E 86 7E D3  ..=+..K.M.......
#             0010: 6D D4 C0 12 AE AA FC AB   57 33 15 85 51 D0 A1 13  m.......W3..Q...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.804 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "59 7A E3 27 69 A8 36 40 E3 48 3C 29 37 B7 8E B5 78 E8 39 EE FD 09 E2 9B A1 31 F7 A8 D1 02 82 09",
#   "session id"          : "FB EC C1 7B C5 DB B6 DB 22 13 57 5B 08 27 D0 E6 4F 7C AC A3 6F 6F 67 20 E9 A8 C1 0A 94 00 B1 17",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 57 03 2F 95 A6 FC D6 5C   7B 14 00 47 C8 9B 02 FF  W./....\...G....
#           0010: 7B 88 C9 92 FB C4 BD BF   57 B0 24 91 2C 0F 54 5D  ........W.$.,.T]
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.804 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.804 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.806 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.806 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.809 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.813 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.813 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.813 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.814 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.814 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:43.814 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:43.814 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.814 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.814 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.838 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.839 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.840 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.843 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.844 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.844 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.844 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.844 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.844 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.844 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:43.844 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:43.844 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.846 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.846 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.846 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.846 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.848 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.849 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:43.849 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.851 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 2F 59 79",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 13:35:20.000 UTC",
#       "not  after"         : "2024-01-15 13:35:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#           0010: 84 80 4C AC                                        ..L.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C4 A5 F2 E6 FC 0B 57 92   C3 8A EE 1E 83 F4 47 3C  ......W.......G<
#           0010: 4F 4B C7 C9                                        OK..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.852 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.913 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 D8 C6 E9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 13:35:18.000 UTC",
#     "not  after"         : "2024-01-15 13:35:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C E4 A7 CA C4 37 5B FC   4A 22 F3 60 EC 66 FA 56  .....7[.J".`.f.V
#         0010: CD 0E 18 FE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#         0010: 84 80 4C AC                                        ..L.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.916 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 80 F7 89 E7 1D 8D FB 0F   C1 A9 3E F8 EB EF B8 48  ..........>....H
#     0010: E9 C2 34 46 90 AD F2 3A   66 D7 DC AC 3D B4 05 DE  ..4F...:f...=...
#     0020: 15 FB 24 1B 82 A5 AE 51   62 54 EE E9 DF 05 46 BF  ..$....QbT....F.
#     0030: E8 C2 59 65 10 EF 8F 72   35 90 F4 FF 1D 17 E8 43  ..Ye...r5......C
#     0040: 3F 1E C6 B0 16 9A 8F 94   A9 25 8E 34 CB 52 D5 3C  ?........%.4.R.<
#     0050: 2D 44 3E 50 67 9D 91 A5   BC CA CD 65 72 C6 C1 32  -D>Pg......er..2
#     0060: B9 F9 25 21 41 43 36 88   78 3A C2 22 D7 8F FA 9E  ..%!AC6.x:."....
#     0070: 28 C9 40 72 1B C9 7A 8B   E9 BC 93 D8 5A 07 A3 7D  (.@r..z.....Z...
#     0080: D1 2C 70 92 C2 F7 3A 8A   52 45 A8 58 D4 A1 0E BE  .,p...:.RE.X....
#     0090: D4 E3 C8 33 AA 45 BE 03   9F 0A 80 31 B4 C4 FC 5C  ...3.E.....1...\
#     00A0: 59 78 43 5E 15 C0 B6 97   7F E7 B9 4A BE F6 DB 14  YxC^.......J....
#     00B0: 7E 9B 08 D9 D5 77 7C 45   9C B3 BF D3 07 D3 33 51  .....w.E......3Q
#     00C0: 8A 4A 78 8D E0 A1 60 01   8A BE 4D BF DB AD 34 A0  .Jx...`...M...4.
#     00D0: 41 37 C8 43 6D 1A 89 54   D6 8A 5C C8 85 96 48 FD  A7.Cm..T..\...H.
#     00E0: B9 C0 9B 16 A3 CD 46 9A   57 21 9A 70 37 74 7E 63  ......F.W!.p7t.c
#     00F0: 49 A0 2D 70 83 81 A0 9A   5B 49 D6 FE 5A 66 30 74  I.-p....[I..Zf0t
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.918 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BF 95 C3 F3 58 A8 46 E1   88 3E 2E 28 58 D2 7F 5A  ....X.F..>.(X..Z
#     0010: CF 7C C8 C1 29 B5 8B 73   AF 46 83 1E E5 1A DE 3D  ....)..s.F.....=
#     0020: 80 ED E1 B4 61 7B 65 D1   09 BC E9 6C 8C D8 1D 97  ....a.e....l....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.919 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 13:35:43.920 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:43.920 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 13:35:43.921 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:43.921 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 13:35:43.921 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:43.921 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.921 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.924 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 FF 91 53",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 13:35:24.000 UTC",
#       "not  after"         : "2024-01-15 13:35:24.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#           0010: 84 80 4C AC                                        ..L.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 72 ED 0E 07 2E A3 B4   EB 36 40 8E 93 63 B8 13  er.......6@..c..
#           0010: 37 B2 97 3F                                        7..?
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 D8 C6 E9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 13:35:18.000 UTC",
#       "not  after"         : "2024-01-15 13:35:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C E4 A7 CA C4 37 5B FC   4A 22 F3 60 EC 66 FA 56  .....7[.J".`.f.V
#           0010: CD 0E 18 FE                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#           0010: 84 80 4C AC                                        ..L.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.946 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 97 3B 6E 28 50 39 9B D0   C5 B6 D8 1F C4 2F 13 39  .;n(P9......./.9
#     0010: BC AD D2 F5 EE 33 EC 9B   31 B4 FE 54 8D 67 9C EF  .....3..1..T.g..
#     0020: 7F 56 65 B1 DD B9 D3 72   0A 10 49 82 6A 31 6D 7E  .Ve....r..I.j1m.
#     0030: A7 0E 6B DD 60 26 D3 B4   F0 82 0E 3F 21 76 02 B8  ..k.`&.....?!v..
#     0040: 86 6E D3 A2 A9 8C C8 89   9E 88 D8 D1 A7 B4 C1 90  .n..............
#     0050: 4D AB F8 7E 93 FD 4F 14   13 9F 62 91 25 B9 22 F5  M.....O...b.%.".
#     0060: 3D 5A E6 DB C3 2A BA 13   28 E9 04 62 86 6D 09 DD  =Z...*..(..b.m..
#     0070: 79 A8 CB 19 CA 15 B9 03   75 72 2B B1 F2 E4 EE A0  y.......ur+.....
#     0080: 51 45 D1 1A 77 E5 84 C4   E8 5D BA 99 81 63 6F A4  QE..w....]...co.
#     0090: 0C 31 B5 5C E9 47 1E C1   9E 16 B8 A2 00 0E 5A AE  .1.\.G........Z.
#     00A0: 81 C9 E0 AF 56 7E 00 85   B7 1B CB 44 00 EE DD 67  ....V......D...g
#     00B0: F6 79 00 D0 C0 EE CD AD   A0 6A F3 AC 18 FE B6 FE  .y.......j......
#     00C0: F1 09 25 AB 4B C2 44 2B   62 FE A5 7F D1 06 03 BC  ..%.K.D+b.......
#     00D0: 99 7C 42 85 36 C6 9E 5A   EA D5 C7 82 57 17 F6 05  ..B.6..Z....W...
#     00E0: 2D 63 BA 50 17 A2 AA F9   5B 14 40 9F 73 47 47 51  -c.P....[.@.sGGQ
#     00F0: 5A 43 03 EC FE 05 D7 56   B9 BF 21 E8 04 FF 43 27  ZC.....V..!...C'
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.947 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2B D9 31 CB D7 53 18 2E   0B 06 2C 6A 53 4F B6 AA  +.1..S....,jSO..
#     0010: 54 8D B8 86 10 F9 A4 9C   D3 29 1C EE B7 43 1C D2  T........)...C..
#     0020: 1C 02 01 78 62 54 B3 DF   04 72 40 F4 A2 F4 89 72  ...xbT...r@....r
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:43.947 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:44.208 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E9 33 60 4D 09 33 1B 45 E3 7A 0D 04 47 ED 42 55 C6 0F 6D E5 03 6F 20 2A 64 BA CA 58 97 4A 9B FA",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 13:35:44.235 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 13:35:44.235 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 13:35:44.235 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 13:35:44.235 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-17 13:35:44.492 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 13:35:44.493 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-17 13:35:57.556; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-17 13:35:57.900 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F 3E 5D AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 13:35:15.000 UTC",
#       "not  after"         : "2024-01-15 13:35:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C E4 A7 CA C4 37 5B FC   4A 22 F3 60 EC 66 FA 56  .....7[.J".`.f.V
#           0010: CD 0E 18 FE                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 D8 C6 E9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 13:35:18.000 UTC",
#       "not  after"         : "2024-01-15 13:35:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C E4 A7 CA C4 37 5B FC   4A 22 F3 60 EC 66 FA 56  .....7[.J".`.f.V
#           0010: CD 0E 18 FE                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 99 F3 4A 75 71 13 FD   30 A1 AD 3A 31 64 02 77  (..Juq..0..:1d.w
#           0010: 84 80 4C AC                                        ..L.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-17 13:35:57.913 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 13:35:58.084 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:58.084 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 13:35:58.086 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 13:35:58.086 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:58.091 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:58.102 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:58.102 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:58.102 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 13:35:58.104 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "38 9E B7 45 E6 7B 75 70 80 5A CA 1A 31 3B DA 60 F9 F2 E3 0D DE B8 FE 16 67 B6 5B C1 1F 9D D0 71",
#     "session id"          : "0F B2 25 38 25 B9 95 46 0D 2D D8 A1 46 9F 88 D4 A6 09 25 B1 CE 4D 51 42 DA 4E 0E A1 D8 1A AA 31",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: AA 56 E0 59 06 7F BB F1   0C 63 25 A8 6E 4C FA B0  .V.Y.....c%.nL..
#               0010: 78 21 A0 E1 C8 FE CB 28   76 B7 13 BD BF EA 47 20  x!.....(v.....G
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.124 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "01 6A 3C 20 BC A1 73 0B 68 92 AB 20 D7 30 A3 58 8E 3E F4 FD 8C B3 67 28 8B D6 FF 13 DF AA EE B6",
#     "session id"          : "0F B2 25 38 25 B9 95 46 0D 2D D8 A1 46 9F 88 D4 A6 09 25 B1 CE 4D 51 42 DA 4E 0E A1 D8 1A AA 31",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6D 54 1E 36 F7 55 6C EF   E3 B9 25 C5 40 4B 1F B1  mT.6.Ul...%.@K..
#             0010: D8 33 3C B8 B8 E5 1E 5F   91 8F 68 2C CF A9 D0 19  .3<...._..h,....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.125 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.125 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.126 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.126 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.128 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.134 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.134 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.134 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.134 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.134 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.134 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:58.138 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:35:58.138 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.146 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.149 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.150 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.153 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 13:35:58.153 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.n

[...truncated too long message...]

ity.AccessController.doPrivileged(Native Method)
#   	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 13:37:12.350 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:36092/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14441ms
ok 65 stop command for single port in 18017ms
ok 66 status detects locally running solr in 7934ms
ok 67 status does not expose cli parameters to end user in 246ms
ok 68 listing out files in 2838ms
ok 69 copying files around in 6633ms
ok 70 upconfig in 2598ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1251ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1236ms
ok 73 Cleanup in 1258ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 59s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/koac5ohisfgna

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 844 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/844/

All tests passed

Build Log:
[...truncated 1169 lines...]
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-17 10:37:12.144; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 10:37:14.416; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 3430ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-17 10:37:16.704; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 10:37:17.869; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 3407ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-17 10:37:20.146; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 10:37:21.318; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2345ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-17 10:37:23.629; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 10:37:23.682; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 18 SOLR-16755 test works with noprompt in 225647ms
# (in test file test/test_example_noprompt.bats, line 32)
#   `solr start -e cloud -noprompt' failed
#
# Welcome to the SolrCloud example!
#
# Starting up 2 Solr nodes for your example SolrCloud cluster.
#
# Creating Solr home directory /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/solr-9.4.1-SNAPSHOT/example/cloud/node1/solr
# Cloning /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/solr-9.4.1-SNAPSHOT/example/cloud/node1 into
#    /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/solr-9.4.1-SNAPSHOT/example/cloud/node2
#
# Starting up Solr on port 32857 using command:
# "/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/solr-9.4.1-SNAPSHOT/bin/solr" start -cloud -p 32857 -s "build/solr-9.4.1-SNAPSHOT/example/cloud/node1/solr"
#
# Waiting up to 180 seconds to see Solr running on port 32857 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32857 (pid=2904). Happy searching!
#
#     
# Starting up Solr on port 32858 using command:
# "/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/solr-9.4.1-SNAPSHOT/bin/solr" start -cloud -p 32858 -s "build/solr-9.4.1-SNAPSHOT/example/cloud/node2/solr" -z 127.0.0.1:33857
#
# Waiting up to 180 seconds to see Solr running on port 32858 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]  Still not seeing Solr listening on 32858 after 180 seconds!
# 2023-10-17 10:37:33.802 INFO  (main) [] o.e.j.s.Server jetty-10.0.17; built: 2023-10-09T18:22:21.150Z; git: af15f12297adf5c5083e1f2f8f4c5974438bca25; jvm 11.0.16.1+1
#     
# ERROR: Did not see Solr at http://localhost:32858/solr come online within 30 seconds!
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/18-1
ok 19 Check export command in 23201ms
ok 20 export fails on non cloud mode in 10039ms
ok 21 using curl to extract a single pdf file in 17774ms
ok 22 using the bin/solr post tool to extract content from pdf in 19896ms
ok 23 using the bin/solr post tool to crawl web site in 22180ms
ok 24 healthcheck on cloud solr in 30527ms
ok 25 start help flag prints help in 181ms
ok 26 stop help flag prints help in 162ms
ok 27 restart help flag prints help in 172ms
ok 28 status help flag prints help in 55ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 163ms
ok 30 create help flag prints help in 165ms
ok 31 createcore help flag prints help in 168ms
ok 32 createcollection help flag prints help in 163ms
ok 33 delete help flag prints help in 179ms
ok 34 version help flag prints help in 55ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 172ms
ok 36 auth help flag prints help in 170ms
ok 37 assert help flag prints help in 986ms
ok 38 post help flag prints help in 1016ms
not ok 39 SQL Module in 16089ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:32857/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-17 10:43:27.642; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 10:43:33.211; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:32857/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 20241ms
not ok 41 icu collation in analysis-extras module in 11428ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-17 10:44:02.668; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 10:44:04.928; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1353ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 26225 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 26225 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10549ms
not ok 44 deploying and undeploying a collection level package in 196430ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 32857 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32857 (pid=12722). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 13376ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-17 10:47:45.023; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 10:47:46.184; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-17 10:47:47.259; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 10:47:47.315; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 16709ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-17 10:48:00.539; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 10:48:01.708; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-17 10:48:02.858; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 10:48:04.037; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 7500ms
not ok 48 basic post with a type specified in 1528ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1294ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1432ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1493ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1670ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1365ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1796ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 3717ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-17 10:48:36.626; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 10:48:36.686; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 4718ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-17 10:48:39.147; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 10:48:41.402; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10312ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:32857/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-A0j6OO%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-17 10:48:51.758; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 10:48:51.828; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:32857/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-A0j6OO%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12807ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 32857 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32857 (pid=22179). Happy searching!
#
#     INFO  - 2023-10-17 10:48:59.269; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 10:48:59.274; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 10:48:59.740; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-A0j6OO/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-A0j6OO/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-17 10:49:02.814; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-17 10:49:02.819; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-17 10:49:04.401; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 10:49:04.405; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12913ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 32857 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32857 (pid=22786). Happy searching!
#
#     INFO  - 2023-10-17 10:49:12.213; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 10:49:12.217; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 10:49:12.615; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1536602f(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-A0j6OO/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-A0j6OO/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 10:49:12.719; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-A0j6OO/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-A0j6OO/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 10:49:12.720; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-A0j6OO/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-A0j6OO/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-17 10:49:15.755; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-17 10:49:15.759; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-17 10:49:16.175; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-A0j6OO/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-A0j6OO/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-17 10:49:16.176; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-A0j6OO/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-A0j6OO/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-17 10:49:17.306; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 10:49:17.311; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-17 10:49:17.762; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-A0j6OO/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-A0j6OO/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 10:49:17.763; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-A0j6OO/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-A0j6OO/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10577ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 32857 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32857 (pid=23365). Happy searching!
#
#     INFO  - 2023-10-17 10:49:25.167; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 10:49:25.171; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-17 10:49:27.983; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 10:49:27.987; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 14044ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-17 10:49:36.783; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-17 10:49:40.552; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-17 10:49:42.118; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 38219ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-A0j6OO/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 32857 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32857 (pid=24956). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 32858 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 32858 (pid=25065). Happy searching!
#
#     INFO  - 2023-10-17 10:50:07.977; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 10:50:07.983; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 10:50:09.142; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@44c79f32(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-A0j6OO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-A0j6OO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 10:50:09.146; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-A0j6OO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-A0j6OO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 10:50:09.147; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(ca,h=[localhost],a=[],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-A0j6OO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-A0j6OO/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 10:50:09.439 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 44 6A DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 10:49:54.000 UTC",
#     "not  after"         : "2024-01-15 10:49:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 A4 5D 49 DC A6 38 4F   23 0B 59 32 7E CC 55 40  ..]I..8O#.Y2..U@
#         0010: 06 7A E0 41                                        .z.A
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 F0 82 D1 5B 19 59 4F   80 12 D0 15 08 1B 8C 92  ....[.YO........
#         0010: F2 E7 2C F1                                        ..,.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 DF 6F 3F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 10:49:47.000 UTC",
#     "not  after"         : "2024-01-15 10:49:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 8A D3 E1 97 F6 86 08   67 40 EA 77 82 ED 37 8C  k.......g@.w..7.
#         0010: A0 21 57 E3                                        .!W.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 A4 5D 49 DC A6 38 4F   23 0B 59 32 7E CC 55 40  ..]I..8O#.Y2..U@
#         0010: 06 7A E0 41                                        .z.A
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 10:50:09.446 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D 84 36 83",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 10:49:45.000 UTC",
#     "not  after"         : "2024-01-15 10:49:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 8A D3 E1 97 F6 86 08   67 40 EA 77 82 ED 37 8C  k.......g@.w..7.
#         0010: A0 21 57 E3                                        .!W.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 DF 6F 3F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 10:49:47.000 UTC",
#     "not  after"         : "2024-01-15 10:49:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 8A D3 E1 97 F6 86 08   67 40 EA 77 82 ED 37 8C  k.......g@.w..7.
#         0010: A0 21 57 E3                                        .!W.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 A4 5D 49 DC A6 38 4F   23 0B 59 32 7E CC 55 40  ..]I..8O#.Y2..U@
#         0010: 06 7A E0 41                                        .z.A
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 10:50:09.465 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 10:50:09.722 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 10:50:09.722 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 10:50:09.724 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 10:50:09.724 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 10:50:09.728 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 10:50:09.742 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 10:50:09.742 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 10:50:09.742 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 10:50:09.744 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "43 DD A2 63 A1 E4 50 43 DC 3E 85 7F 60 5B 34 F5 9F 08 72 C2 BC D7 00 EF A0 25 E4 9B 90 6A 48 C6",
#   "session id"          : "3F A8 F6 62 F6 00 BC FE BF BA 57 C4 E8 C8 16 0F D5 74 44 B5 05 30 31 6D 06 AC 54 F1 6F EA A8 5D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A9 63 56 1F 3E E8 10 BA   DB 74 22 50 89 76 F4 C6  .cV.>....t"P.v..
#             0010: F4 EA 5B 5A 2F 84 C1 A3   17 6C F7 B3 AE 6B AE 33  ..[Z/....l...k.3
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.225 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E8 2B A0 14 2D 1D D0 41 78 C4 B8 75 08 C3 B1 C4 83 CE 85 90 64 57 1A 7B 8D FA A0 2B 7D A1 D5 ED",
#   "session id"          : "3F A8 F6 62 F6 00 BC FE BF BA 57 C4 E8 C8 16 0F D5 74 44 B5 05 30 31 6D 06 AC 54 F1 6F EA A8 5D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 17 17 61 7A 62 BC 67 72   8B 40 FC 12 D7 C3 3F 63  ..azb.gr.@....?c
#           0010: AD 93 2A C2 F9 E3 F1 F0   F2 12 A3 D0 98 C3 9F 4B  ..*............K
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.226 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.226 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.232 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.232 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.232 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.233 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.233 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.233 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.234 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.234 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.239 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.242 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.244 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.245 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.245 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.245 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.245 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.246 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.246 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 10:50:10.246 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 10:50:10.246 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.246 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.246 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.265 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.267 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.268 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.278 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.278 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.278 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.278 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.279 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 10:50:10.279 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 10:50:10.279 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.280 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.281 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.281 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.281 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.282 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.283 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 10:50:10.283 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.285 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0C F2 04 AB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 10:49:50.000 UTC",
#       "not  after"         : "2024-01-15 10:49:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A4 A4 5D 49 DC A6 38 4F   23 0B 59 32 7E CC 55 40  ..]I..8O#.Y2..U@
#           0010: 06 7A E0 41                                        .z.A
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 12 84 BF 74 E3 10 9B   AB FC 37 0F 4E 1C 4A 59  M...t.....7.N.JY
#           0010: CB B4 2F 5F                                        ../_
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.286 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.365 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 DF 6F 3F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 10:49:47.000 UTC",
#     "not  after"         : "2024-01-15 10:49:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 8A D3 E1 97 F6 86 08   67 40 EA 77 82 ED 37 8C  k.......g@.w..7.
#         0010: A0 21 57 E3                                        .!W.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 A4 5D 49 DC A6 38 4F   23 0B 59 32 7E CC 55 40  ..]I..8O#.Y2..U@
#         0010: 06 7A E0 41                                        .z.A
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.367 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 35 12 B1 6C 19 6E 47 1B   23 D9 CA B5 2A 76 FD 2E  5..l.nG.#...*v..
#     0010: 53 E7 E1 A2 97 4F CF 8E   F5 BC 05 95 55 3B CE AC  S....O......U;..
#     0020: 82 C3 83 D1 B1 CF A1 7A   6D A3 4B 80 7E 47 18 F7  .......zm.K..G..
#     0030: 05 9F F8 A5 78 BD 18 E3   49 88 46 D8 40 9B 19 36  ....x...I.F.@..6
#     0040: 09 96 23 23 3F 96 75 A0   50 51 BC AF 31 38 C2 32  ..##?.u.PQ..18.2
#     0050: B4 1D 9C 44 A3 C6 C6 1D   CC 07 F4 99 BF E6 F5 B1  ...D............
#     0060: C5 38 92 DD 4E DC C9 C2   AE 8C AD F5 58 57 02 3F  .8..N.......XW.?
#     0070: A0 34 05 40 1D 5C 06 66   72 31 C4 98 C3 05 4F 00  .4.@.\.fr1....O.
#     0080: 07 D0 32 26 C2 4C CB C0   56 EC 4B E6 28 D0 B6 5F  ..2&.L..V.K.(.._
#     0090: 10 67 15 5A 9F 91 83 1C   20 37 22 5E 89 7C B9 88  .g.Z.... 7"^....
#     00A0: 1E E5 F1 7D BA C4 C5 E0   6C 9F 64 C2 9D F3 4A 6E  ........l.d...Jn
#     00B0: 44 BD 40 77 F8 74 E0 6B   91 FB F6 B6 9E 98 1A 9B  D.@w.t.k........
#     00C0: ED F3 57 C4 51 92 89 7B   53 0D 68 94 02 6E AC CF  ..W.Q...S.h..n..
#     00D0: 6C 26 33 B2 6D ED E1 AC   BA 06 78 BA 11 72 DC 81  l&3.m.....x..r..
#     00E0: 19 D7 3E 11 C1 CC A0 70   2E 03 24 BA 5F EF A7 86  ..>....p..$._...
#     00F0: 46 51 68 85 83 05 D5 FE   CF 3A A0 49 66 34 13 22  FQh......:.If4."
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.369 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DC EF 4C AE 55 48 51 28   0B 32 30 FC 24 93 2E DF  ..L.UHQ(.20.$...
#     0010: FB BA 87 17 99 92 46 E5   28 DA 08 84 E7 A4 6F 7F  ......F.(.....o.
#     0020: 1D BE 9A 0E 02 3C BF CF   E1 7B D1 02 3E D5 E6 DE  .....<......>...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.371 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 10:50:10.371 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 10:50:10.371 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 10:50:10.372 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 10:50:10.372 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 10:50:10.372 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 10:50:10.372 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.372 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.374 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 44 6A DB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 10:49:54.000 UTC",
#       "not  after"         : "2024-01-15 10:49:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A4 A4 5D 49 DC A6 38 4F   23 0B 59 32 7E CC 55 40  ..]I..8O#.Y2..U@
#           0010: 06 7A E0 41                                        .z.A
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 F0 82 D1 5B 19 59 4F   80 12 D0 15 08 1B 8C 92  ....[.YO........
#           0010: F2 E7 2C F1                                        ..,.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 DF 6F 3F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 10:49:47.000 UTC",
#       "not  after"         : "2024-01-15 10:49:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 8A D3 E1 97 F6 86 08   67 40 EA 77 82 ED 37 8C  k.......g@.w..7.
#           0010: A0 21 57 E3                                        .!W.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A4 A4 5D 49 DC A6 38 4F   23 0B 59 32 7E CC 55 40  ..]I..8O#.Y2..U@
#           0010: 06 7A E0 41                                        .z.A
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 10:50:10.405 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 10:50:10.405 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 10:50:10.405 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 10:50:10.405 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 10:50:10.419 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 13 99 83 50 31 E4 E7 44   2A A6 D9 57 84 4E EF 08  ...P1..D*..W.N..
#     0010: DA 87 9F A4 7D DB AB A8   A5 DD 43 9E 6A 17 7F B7  ..........C.j...
#     0020: 6B 6E E1 EA 9F 44 BF 94   66 52 B7 01 2C 0B F1 4E  kn...D..fR..,..N
#     0030: 6C 8C C5 E2 3E 2A 6A E5   8D 86 B6 13 D0 15 BA 0D  l...>*j.........
#     0040: 76 FD FC 14 3C 59 8E EC   72 9F E7 7E 5D 6D EE DB  v...<Y..r...]m..
#     0050: BE 1D 2D A8 B0 E9 26 F9   73 5C 41 F2 B0 16 FD 38  ..-...&.s\A....8
#     0060: 49 4E 00 11 08 55 32 E9   13 3D 17 F0 83 2B 52 E6  IN...U2..=...+R.
#     0070: C9 1C 8F 05 A2 07 6A 7E   99 E9 D6 A5 A0 E6 9D A8  ......j.........
#     0080: 3D 98 33 20 44 99 71 BD   7B BD 3C DA CD A8 F1 3B  =.3 D.q...<....;
#     0090: 2A 89 65 D5 A8 0C F8 F1   6C D7 F7 D6 62 7B 96 E2  *.e.....l...b...
#     00A0: 03 64 A3 35 C4 94 9C 77   87 C2 D7 E0 8E DF CE 8F  .d.5...w........
#     00B0: 20 1D 6D 44 B8 21 B6 62   75 ED C6 39 6A 2F 79 47   .mD.!.bu..9j/yG
#     00C0: CE BA 04 D1 A9 D9 9A 18   CD 91 47 25 B1 75 95 A4  ..........G%

[...truncated too long message...]

|2023-10-17 10:50:18.422 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D 84 36 83",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 10:49:45.000 UTC",
#     "not  after"         : "2024-01-15 10:49:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 8A D3 E1 97 F6 86 08   67 40 EA 77 82 ED 37 8C  k.......g@.w..7.
#         0010: A0 21 57 E3                                        .!W.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 DF 6F 3F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 10:49:47.000 UTC",
#     "not  after"         : "2024-01-15 10:49:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 8A D3 E1 97 F6 86 08   67 40 EA 77 82 ED 37 8C  k.......g@.w..7.
#         0010: A0 21 57 E3                                        .!W.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 A4 5D 49 DC A6 38 4F   23 0B 59 32 7E CC 55 40  ..]I..8O#.Y2..U@
#         0010: 06 7A E0 41                                        .z.A
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 10:50:18.433 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 63 start solr with mTLS wanted in 49066ms
ok 64 SOLR-11740 check 'solr stop' connection in 14981ms
ok 65 stop command for single port in 17393ms
not ok 66 status detects locally running solr in 3745ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 25909 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 25909 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 261ms
ok 68 listing out files in 2570ms
ok 69 copying files around in 11070ms
ok 70 upconfig in 2848ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1223ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1227ms
not ok 73 Cleanup in 4826ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 25909 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 1492 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 25909 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 1492 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 6m 43s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/tws5cessqm6pi

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 843 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/843/

All tests passed

Build Log:
[...truncated 1168 lines...]
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-17 08:08:52.295; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:08:52.381; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 5638ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-17 08:08:54.756; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:08:58.115; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2344ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-17 08:09:00.424; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:09:00.484; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 6937ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-17 08:09:02.957; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:09:07.413; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 26950ms
ok 19 Check export command in 22378ms
ok 20 export fails on non cloud mode in 8743ms
not ok 21 using curl to extract a single pdf file in 9057ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 43567 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43567 (pid=14281). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-17 08:10:14.749; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:10:14.800; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 12050ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 43567 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43567 (pid=14738). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-17 08:10:23.542; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:10:26.931; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 10495ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 43567 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43567 (pid=15165). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-17 08:10:35.191; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:10:37.463; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30752ms
ok 25 start help flag prints help in 179ms
ok 26 stop help flag prints help in 166ms
ok 27 restart help flag prints help in 165ms
ok 28 status help flag prints help in 55ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 163ms
ok 30 create help flag prints help in 170ms
ok 31 createcore help flag prints help in 169ms
ok 32 createcollection help flag prints help in 166ms
ok 33 delete help flag prints help in 161ms
ok 34 version help flag prints help in 53ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 168ms
ok 36 auth help flag prints help in 161ms
ok 37 assert help flag prints help in 935ms
ok 38 post help flag prints help in 941ms
not ok 39 SQL Module in 9954ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:43567/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-17 08:11:22.183; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:11:22.243; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:43567/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 21313ms
not ok 41 icu collation in analysis-extras module in 11664ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-17 08:11:51.895; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:11:55.286; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1295ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 26225 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 26225 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9770ms
not ok 44 deploying and undeploying a collection level package in 196122ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 43567 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43567 (pid=19309). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 15849ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-17 08:15:32.931; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:15:35.196; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-17 08:15:36.246; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:15:38.502; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 13372ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-17 08:15:48.646; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:15:50.900; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-17 08:15:51.886; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:15:51.938; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3648ms
not ok 48 basic post with a type specified in 1452ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1237ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1246ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1240ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1365ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1338ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1340ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 5820ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-17 08:16:19.074; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:16:21.328; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2365ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-17 08:16:23.650; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:16:23.706; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 12168ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:43567/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-oYg1br%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-17 08:16:33.723; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 08:16:35.998; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:43567/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-oYg1br%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12439ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 43567 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43567 (pid=25533). Happy searching!
#
#     INFO  - 2023-10-17 08:16:43.132; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 08:16:43.137; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 08:16:43.589; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3c0fae6c(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-oYg1br/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-oYg1br/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-17 08:16:46.481; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-17 08:16:46.486; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-17 08:16:48.064; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 08:16:48.069; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12622ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 43567 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43567 (pid=26173). Happy searching!
#
#     INFO  - 2023-10-17 08:16:55.632; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 08:16:55.637; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 08:16:56.071; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-oYg1br/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-oYg1br/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 08:16:56.153; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-oYg1br/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-oYg1br/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 08:16:56.153; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-oYg1br/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-oYg1br/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-17 08:16:59.134; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-17 08:16:59.139; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-17 08:16:59.652; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5ae76500[provider=null,keyStore=file:///tmp/bats-run-oYg1br/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-oYg1br/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-17 08:16:59.653; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5ae76500[provider=null,keyStore=file:///tmp/bats-run-oYg1br/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-oYg1br/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-17 08:17:00.776; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 08:17:00.781; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-17 08:17:01.173; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-oYg1br/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-oYg1br/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 08:17:01.174; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-oYg1br/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-oYg1br/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 60 start solr with ssl and auth in 18465ms
ok 61 start solr with client truststore and security manager in 25393ms
ok 62 start solr with mTLS needed in 82102ms
not ok 63 start solr with mTLS wanted in 37441ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 475)
#   `assert_output --partial "Created collection 'test'"' failed
# /tmp/bats-run-oYg1br/test/63/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 43567 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43567 (pid=1797). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 43568 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43568 (pid=1923). Happy searching!
#
#     INFO  - 2023-10-17 08:19:31.208; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 08:19:31.216; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 08:19:31.820; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-oYg1br/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oYg1br/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 08:19:31.822; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-oYg1br/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oYg1br/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 08:19:31.823; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-oYg1br/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oYg1br/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 08:19:31.883 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6A 78 3B 8E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 08:19:18.000 UTC",
#     "not  after"         : "2024-01-15 08:19:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 03 3E 1D 75 3C 7D CA   80 14 E3 64 33 F5 CA 91  ..>.u<.....d3...
#         0010: E8 71 F3 32                                        .q.2
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 44 F5 04 5A 28 A6 DA C5   6B 82 2B 4E 12 81 81 0D  D..Z(...k.+N....
#         0010: 92 D4 31 8A                                        ..1.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 08:19:31.887 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 9E AD A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 08:19:10.000 UTC",
#     "not  after"         : "2024-01-15 08:19:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 80 9D 78 27 8B 22 12   0C AA 4A 1B B7 C6 5F 8B  ...x'."...J..._.
#         0010: 26 90 28 40                                        &.(@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 D0 A5 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 08:19:12.000 UTC",
#     "not  after"         : "2024-01-15 08:19:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 80 9D 78 27 8B 22 12   0C AA 4A 1B B7 C6 5F 8B  ...x'."...J..._.
#         0010: 26 90 28 40                                        &.(@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 03 3E 1D 75 3C 7D CA   80 14 E3 64 33 F5 CA 91  ..>.u<.....d3...
#         0010: E8 71 F3 32                                        .q.2
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 08:19:31.907 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 08:19:32.601 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 08:19:32.602 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 08:19:32.604 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 08:19:32.604 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 08:19:32.619 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 08:19:32.645 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 08:19:32.645 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 08:19:32.648 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 08:19:32.656 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0C 3E FA 4F BB A9 6E 14 D3 4E 34 42 87 5B 3C 53 F2 34 A5 F3 54 2C 20 38 09 50 D0 F6 78 10 BE 16",
#   "session id"          : "9E 00 CE 50 01 88 EB 1D 06 49 BA 7D 36 AE 39 0C 13 10 E3 35 5E FB 36 D5 57 D8 A3 8E 48 D8 BB 95",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 16 47 CA 85 F1 CB 56 0E   EB A9 2A CF 89 0E 41 C8  .G....V...*...A.
#             0010: 05 2E B6 E6 F8 38 EA 2D   DD 94 F1 28 2A B1 A9 5C  .....8.-...(*..\
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.815 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F2 DF 4F F4 85 F0 8D 4F 5E 88 FC 74 DF FB E5 B0 BF F8 CD 68 DF 11 59 96 C0 F4 65 15 84 87 60 3D",
#   "session id"          : "9E 00 CE 50 01 88 EB 1D 06 49 BA 7D 36 AE 39 0C 13 10 E3 35 5E FB 36 D5 57 D8 A3 8E 48 D8 BB 95",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 82 47 82 F3 51 1D 7E 64   9A 6C 1D B0 44 13 57 CD  .G..Q..d.l..D.W.
#           0010: 99 5A A3 4F D6 6B 90 1C   4A EE 23 2F 42 B0 5B 4E  .Z.O.k..J.#/B.[N
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.816 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.816 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.819 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.820 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.822 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.822 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.822 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.822 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.822 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.823 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.823 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.823 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.823 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.823 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 08:19:32.823 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 08:19:32.823 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.823 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.823 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.831 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.862 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.864 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.872 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.872 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.872 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.872 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.873 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 08:19:32.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 08:19:32.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.874 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.874 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.874 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.875 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.875 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.876 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 08:19:32.876 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.894 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 A3 84 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 08:19:14.000 UTC",
#       "not  after"         : "2024-01-15 08:19:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 03 3E 1D 75 3C 7D CA   80 14 E3 64 33 F5 CA 91  ..>.u<.....d3...
#           0010: E8 71 F3 32                                        .q.2
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A CC 08 43 EA 7E A6 D7   6C 2E C0 7C C3 A6 AD EF  *..C....l.......
#           0010: 9E FE 27 80                                        ..'.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:32.894 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:33.422 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 D0 A5 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 08:19:12.000 UTC",
#     "not  after"         : "2024-01-15 08:19:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 80 9D 78 27 8B 22 12   0C AA 4A 1B B7 C6 5F 8B  ...x'."...J..._.
#         0010: 26 90 28 40                                        &.(@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 03 3E 1D 75 3C 7D CA   80 14 E3 64 33 F5 CA 91  ..>.u<.....d3...
#         0010: E8 71 F3 32                                        .q.2
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:33.435 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2C 8B E4 90 D9 60 8F E7   FC 80 ED 89 E1 EC 27 B3  ,....`........'.
#     0010: 15 DD 2C 93 77 B4 7F E5   5D 29 48 AB 5D 01 EC 96  ..,.w...])H.]...
#     0020: 87 CB C2 69 8A 9C DA A9   47 46 4A AC FF 7D 9A D7  ...i....GFJ.....
#     0030: F4 42 4B 42 FB F3 DD A7   6C 80 2C 57 C9 BB B7 31  .BKB....l.,W...1
#     0040: 8C E8 2F EE EC 87 39 59   37 BD F2 15 46 CA B2 8E  ../...9Y7...F...
#     0050: 3E C9 D4 54 55 BA BB C9   27 C7 37 02 DB 69 2F 5E  >..TU...'.7..i/^
#     0060: 0A 14 80 1B 77 51 80 0E   50 E4 FF 98 EF 3D DB D9  ....wQ..P....=..
#     0070: 28 60 A2 53 4D FF F7 1B   1B 87 2E FB 9F 09 04 BB  (`.SM...........
#     0080: 09 29 DE 6A B3 43 8B A2   61 8F 67 FA 74 57 57 C5  .).j.C..a.g.tWW.
#     0090: 0A 91 A0 16 E7 56 17 46   AD 77 D9 FA DD C0 82 AE  .....V.F.w......
#     00A0: BB 44 DB B9 D9 BE 4B 30   52 EC 76 9D 18 2D 70 BC  .D....K0R.v..-p.
#     00B0: 6E 26 F6 6A 75 CC 69 62   8F 3E 3C E1 AE 26 E1 1E  n&.ju.ib.><..&..
#     00C0: 2B 41 1E 69 86 B6 91 08   EB 76 B2 2A 5D EA 29 D1  +A.i.....v.*].).
#     00D0: E8 DA 54 61 5C D1 C5 63   E1 C8 98 39 B8 38 80 39  ..Ta\..c...9.8.9
#     00E0: A9 8F 0F 64 78 81 26 0B   5F 54 CD B7 E1 F6 81 8C  ...dx.&._T......
#     00F0: 4A 3C 7A 69 1A 36 FF B7   7C 7D F2 89 70 0B EF 24  J<zi.6......p..$
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:33.437 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 32 5A 0D E2 C3 9A F6 08   D7 8A CD 8F 05 32 EB 71  2Z...........2.q
#     0010: 42 BC 3C 82 76 85 35 66   9F C8 F6 EB 42 CE 30 90  B.<.v.5f....B.0.
#     0020: 3E ED 39 FB 9A 98 60 7A   7C B4 D4 C2 5B CE 02 48  >.9...`z....[..H
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:33.443 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 08:19:33.449 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 08:19:33.449 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 08:19:33.450 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 08:19:33.450 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 08:19:33.450 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 08:19:33.450 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:33.450 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:33.452 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6A 78 3B 8E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 08:19:18.000 UTC",
#       "not  after"         : "2024-01-15 08:19:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 03 3E 1D 75 3C 7D CA   80 14 E3 64 33 F5 CA 91  ..>.u<.....d3...
#           0010: E8 71 F3 32                                        .q.2
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 44 F5 04 5A 28 A6 DA C5   6B 82 2B 4E 12 81 81 0D  D..Z(...k.+N....
#           0010: 92 D4 31 8A                                        ..1.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:33.510 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 85 74 E0 DE FC 2A 68 91   09 4F DD 5D 79 07 7A A0  .t...*h..O.]y.z.
#     0010: 65 71 4A 01 27 1E 83 F1   24 DE 72 ED F5 1C D9 49  eqJ.'...$.r....I
#     0020: 2E 15 7B 5C 3D 67 21 40   BC 95 2F 92 E0 F2 D8 47  ...\=g!@../....G
#     0030: 51 83 0C C8 6C 43 21 8D   32 3C 6B 73 F0 48 FC 13  Q...lC!.2<ks.H..
#     0040: 17 6F 4D C7 2A B9 A4 EF   2A 06 AA 9D D1 9D 2E 83  .oM.*...*.......
#     0050: 2D CE 29 38 2D 27 CC 32   96 FA 2B 22 89 4F A3 AC  -.)8-'.2..+".O..
#     0060: DA 58 CF 14 A2 AA 4D 03   9A 48 7A 3D 3E C0 DC 50  .X....M..Hz=>..P
#     0070: 71 19 27 65 88 10 69 F4   22 52 D7 C6 65 22 CF F6  q.'e..i."R..e"..
#     0080: 5B 96 D2 2B 63 75 97 F1   B0 0C DE 0A F4 B0 5B AA  [..+cu........[.
#     0090: 5F D8 0A 37 AE E7 EF DA   E3 CC 32 60 54 D2 C1 7C  _..7......2`T...
#     00A0: 5D AA 03 8E D7 E2 92 58   11 D5 7C 9C C3 9B 8A 62  ]......X.......b
#     00B0: CA 88 78 CE F3 44 77 36   7B DE 99 67 A7 D3 D2 5C  ..x..Dw6...g...\
#     00C0: 78 FD 5E 2F 4A 8D 6A 74   47 D0 06 C4 E4 67 32 CA  x.^/J.jtG....g2.
#     00D0: 24 54 09 B2 FC DE 9C 01   85 68 96 8F DF 8A BF C5  $T.......h......
#     00E0: 43 FF 21 43 5B 56 AC B6   04 59 28 76 6F 3F B5 79  C.!C[V...Y(vo?.y
#     00F0: C2 28 CB 75 2F 64 99 9C   53 CB AC 4B 7F A4 02 75  .(.u/d..S..K...u
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:33.511 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3E 1C 0B 52 7D DE D8 C5   2B C6 9A 3C FF A6 80 6F  >..R....+..<...o
#     0010: 57 CB 68 55 C0 81 E4 67   7E 48 33 E2 FC D2 A4 45  W.hU...g.H3....E
#     0020: 42 7B A3 51 6B 9E 98 16   D9 A4 86 76 F5 43 06 68  B..Qk......v.C.h
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:33.512 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-17 08:19:33.647 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "EB A0 3B 8A 60 CA F3 52 47 D6 7F 17 C7 A9 77 9F E5 40 AE 04 25 C0 34 2D 65 FE 94 2F 7B 15 02 BE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 08:19:33.896 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 08:19:33.897 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-17 08:19:35.340; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 08:19:35.344; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 08:19:35.691; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-oYg1br/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oYg1br/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 08:19:35.693; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-oYg1br/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oYg1br/test/63/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 08:19:35.693; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-oYg1br/test/63/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oYg1br/test/63/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 08:19:35.732 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6A 78 3B 8E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 08:19:18.000 UTC",
#     "not  after"         : "2024-01-15 08:19:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 03 3E 1D 75 3C 7D CA   80 14 E3 64 33 F5 CA 91  ..>.u<.....d3...
#         0010: E8 71 F3 32                                        .q.2
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 44 F5 04 5A 28 A6 DA C5   6B 82 2B 4E 12 81 81 0D  D..Z(...k.+N....
#         0010: 92 D4 31 8A                                        ..1.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 08:19:35.940 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 9E AD A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 08:19:10.000 UTC",
#     "not  after"         : "2024-01-15 08:19:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 80 9D 78 27 8B 22 12   0C AA 4A 1B B7 C6 5F 8B  ...x'."...J..._.
#         0010: 26 90 28 40                                        &.(@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 D0 A5 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 08:19:12.000 UTC",
#     "not  after"         : "2024-01-15 08:19:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 80 9D 78 27 8B 22 12   0C AA 4A 1B B7 C6 5F 8B  ...x'."...J..._.
#         0010: 26 90 28 40                                        &.(@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 03 3E 1D 75 3C 7D CA   80 14 E3 64 33 F5 CA 91  ..>.u<.....d3...
#         0010: E8 71 F3 32                                        .q.2
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 08:19:35.952 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 08:19:36.110 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 08:19:36.111 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 08:19:36.112 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 08:19:36.112 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 08:19:36.117 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 08:19:36.127 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 08:19:36.127 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 08:19:36.128 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 08:19:36.130 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "16 B2 C4 E2 AF A3 77 56 60 32 4C B1 87 E5 CB 89 9F 05 36 02 14 1D 71 9B CE 3C 92 4A 09 AB 91 06",
#   "session id"          : "A0 D5 50 B5 E1 60 3A 93 53 A9 B4 87 B1 4C 6F B5 1C C7 36 F6 7E 5F 6A 9F 7C 34 C9 3E EC E2 7A BA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A7 26 32 39 7F 4F E9 0F   82 FD 51 F1 05 F2 53 3C  .&29.O....Q...S<
#             0010: D4 76 E8 C8 90 00 3F 98   F4 65 47 52 66 3F 52 6C  .v....?..eGRf?Rl
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:36.226 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F1 38 EB 32 6F 9A C6 06 4A 69 9B 8B 20 F3 75 6B 94 31 87 A0 FF B9 4D B6 1E 8D E0 83 61 2E FC 52",
#   "session id"          : "A0 D5 50 B5 E1 60 3A 93 53 A9 B4 87 B1 4C 6F B5 1C C7 36 F6 7E 5F 6A 9F 7C 34 C9 3E EC E2 7A BA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D5 EF 98 E9 E4 C0 EF 89   7B EA CB D2 6B 28 B0 41  ............k(.A
#           0010: 92 4F ED 44 31 EA 83 AC   80 FE 38 26 82 8A 39 1B  .O.D1.....8&..9.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 08:19:36.226 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.

[...truncated too long message...]

         DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 44 F5 04 5A 28 A6 DA C5   6B 82 2B 4E 12 81 81 0D  D..Z(...k.+N....
#         0010: 92 D4 31 8A                                        ..1.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 08:19:40.363 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 9E AD A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 08:19:10.000 UTC",
#     "not  after"         : "2024-01-15 08:19:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 80 9D 78 27 8B 22 12   0C AA 4A 1B B7 C6 5F 8B  ...x'."...J..._.
#         0010: 26 90 28 40                                        &.(@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 D0 A5 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 08:19:12.000 UTC",
#     "not  after"         : "2024-01-15 08:19:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 80 9D 78 27 8B 22 12   0C AA 4A 1B B7 C6 5F 8B  ...x'."...J..._.
#         0010: 26 90 28 40                                        &.(@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 03 3E 1D 75 3C 7D CA   80 14 E3 64 33 F5 CA 91  ..>.u<.....d3...
#         0010: E8 71 F3 32                                        .q.2
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 08:19:40.373 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14694ms
ok 65 stop command for single port in 17907ms
not ok 66 status detects locally running solr in 2622ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 25909 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 25909 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 257ms
ok 68 listing out files in 3650ms
ok 69 copying files around in 7529ms
ok 70 upconfig in 2962ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1214ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1220ms
not ok 73 Cleanup in 3593ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 25909 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 25909 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 2s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/qgf3r2kbuxwas

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 842 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/842/

All tests passed

Build Log:
[...truncated 1165 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196473ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 6737ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-17 04:45:10.834; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:45:14.192; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1208ms
not ok 8 accept d option with builtin config in 2406ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-17 04:45:17.822; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:45:17.879; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 5697ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-17 04:45:20.238; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:45:23.600; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2380ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-17 04:45:25.950; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:45:26.005; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2297ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-17 04:45:28.276; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:45:28.333; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2321ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-17 04:45:30.628; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:45:30.681; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 4549ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-17 04:45:32.976; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:45:35.246; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 14 can delete collections in 12497ms
ok 15 collection delete also deletes zk config in 10936ms
ok 16 deletes accompanying zk config with nondefault name in 14444ms
ok 17 deleteConfig option can opt to leave config in zk in 7600ms
ok 18 SOLR-16755 test works with noprompt in 25442ms
ok 19 Check export command in 23396ms
ok 20 export fails on non cloud mode in 10058ms
not ok 21 using curl to extract a single pdf file in 14713ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 36987 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36987 (pid=10844). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-17 04:47:36.541; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:47:39.897; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 10123ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 36987 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36987 (pid=11612). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-17 04:47:48.877; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:47:50.034; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 10061ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 36987 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36987 (pid=12123). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-17 04:48:00.075; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:48:00.134; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 35541ms
ok 25 start help flag prints help in 168ms
ok 26 stop help flag prints help in 168ms
ok 27 restart help flag prints help in 173ms
ok 28 status help flag prints help in 54ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 165ms
ok 30 create help flag prints help in 165ms
ok 31 createcore help flag prints help in 171ms
ok 32 createcollection help flag prints help in 169ms
ok 33 delete help flag prints help in 163ms
ok 34 version help flag prints help in 55ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 169ms
ok 36 auth help flag prints help in 170ms
ok 37 assert help flag prints help in 941ms
ok 38 post help flag prints help in 953ms
not ok 39 SQL Module in 9997ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:36987/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-17 04:48:49.807; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:48:49.862; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:36987/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 23258ms
not ok 41 icu collation in analysis-extras module in 12072ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-17 04:49:21.840; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:49:25.199; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1370ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 4383 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10136ms
not ok 44 deploying and undeploying a collection level package in 196582ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 36987 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36987 (pid=18834). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 11465ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-17 04:53:03.862; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:53:03.917; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-17 04:53:04.923; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:53:04.987; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 11428ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-17 04:53:15.323; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:53:15.378; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-17 04:53:16.395; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:53:16.447; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3864ms
not ok 48 basic post with a type specified in 1427ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1254ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1318ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1244ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1422ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1386ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1404ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 5845ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-17 04:53:44.149; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:53:46.406; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 3563ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-17 04:53:48.797; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:53:49.953; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10006ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:36987/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-CnVERc%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-17 04:53:59.989; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 04:54:00.046; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:36987/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-CnVERc%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12572ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 36987 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36987 (pid=25183). Happy searching!
#
#     INFO  - 2023-10-17 04:54:07.483; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 04:54:07.487; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 04:54:08.000; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-CnVERc/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnVERc/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-17 04:54:10.606; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-17 04:54:10.611; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-17 04:54:12.119; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 04:54:12.125; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12595ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 36987 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36987 (pid=25752). Happy searching!
#
#     INFO  - 2023-10-17 04:54:20.060; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 04:54:20.064; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 04:54:20.563; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-CnVERc/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnVERc/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 04:54:20.685; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-CnVERc/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnVERc/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 04:54:20.686; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-CnVERc/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnVERc/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-17 04:54:23.308; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-17 04:54:23.313; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-17 04:54:23.919; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-CnVERc/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnVERc/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-17 04:54:23.921; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-CnVERc/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnVERc/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-17 04:54:25.043; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 04:54:25.047; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-17 04:54:25.475; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-CnVERc/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnVERc/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 04:54:25.477; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-CnVERc/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnVERc/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10767ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 36987 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36987 (pid=26435). Happy searching!
#
#     INFO  - 2023-10-17 04:54:32.728; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 04:54:32.732; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-17 04:54:35.532; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 04:54:35.536; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13513ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-17 04:54:44.332; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-17 04:54:48.062; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-17 04:54:49.487; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 39861ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-CnVERc/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 36987 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36987 (pid=28095). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 36988 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]  
# Started Solr server on port 36988 (pid=28206). Happy searching!
#
#     INFO  - 2023-10-17 04:55:15.917; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 04:55:15.921; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 04:55:16.382; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-CnVERc/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CnVERc/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 04:55:16.384; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-CnVERc/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CnVERc/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 04:55:16.389; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-CnVERc/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CnVERc/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 04:55:16.499 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 66 16 55",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 04:55:01.000 UTC",
#     "not  after"         : "2024-01-15 04:55:01.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 64 BD E5 A7 67 D5 83 2E   03 61 35 D4 F7 3F 05 BF  d...g....a5..?..
#         0010: 67 C5 1C BA                                        g...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 6A 02 5D 3F B6 CF 22   14 24 F9 26 A6 64 8E BE  .j.]?..".$.&.d..
#         0010: 19 A8 1C FE                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 96 ED E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 04:54:54.000 UTC",
#     "not  after"         : "2024-01-15 04:54:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D1 F2 A6 F8 3C 3A 42 DD   DD 43 12 3F 87 0C 8C FF  ....<:B..C.?....
#         0010: A9 58 52 CD                                        .XR.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 64 BD E5 A7 67 D5 83 2E   03 61 35 D4 F7 3F 05 BF  d...g....a5..?..
#         0010: 67 C5 1C BA                                        g...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 04:55:16.512 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 96 ED E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 04:54:54.000 UTC",
#     "not  after"         : "2024-01-15 04:54:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D1 F2 A6 F8 3C 3A 42 DD   DD 43 12 3F 87 0C 8C FF  ....<:B..C.?....
#         0010: A9 58 52 CD                                        .XR.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 64 BD E5 A7 67 D5 83 2E   03 61 35 D4 F7 3F 05 BF  d...g....a5..?..
#         0010: 67 C5 1C BA                                        g...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 07 92 44",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 04:54:52.000 UTC",
#     "not  after"         : "2024-01-15 04:54:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D1 F2 A6 F8 3C 3A 42 DD   DD 43 12 3F 87 0C 8C FF  ....<:B..C.?....
#         0010: A9 58 52 CD                                        .XR.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 04:55:16.536 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 04:55:17.176 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 04:55:17.177 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 04:55:17.177 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 04:55:17.177 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 04:55:17.198 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 04:55:17.198 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 04:55:17.207 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 04:55:17.207 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 04:55:17.220 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 04:55:17.237 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 04:55:17.237 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 04:55:17.237 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 04:55:17.239 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5F 60 21 13 9C 0C 3F 20 0A CE 1A 35 8A EA 93 74 1A 71 C6 21 96 0F A3 C1 5A A8 11 7F BC 20 B8 01",
#   "session id"          : "3C 62 0E 71 24 D5 B0 9F 74 D4 19 8B 10 FF 98 A0 0C 1C BD 8A 0D 15 47 DF 41 20 DE B2 A9 62 C3 0F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A3 7E 81 AA A8 57 58 79   B3 B4 DA B1 4B 4D 2A 9C  .....WXy....KM*.
#             0010: 74 BA 8A FE EF 8E 25 41   CA F4 91 B9 FE 6F BB 7B  t.....%A.....o..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.808 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "7E 08 87 D9 92 4A 88 F3 EE A7 7E 41 A6 98 B0 58 B6 5A B9 48 26 A6 4F 37 AB E6 6F 4E 4D 05 FF 98",
#   "session id"          : "3C 62 0E 71 24 D5 B0 9F 74 D4 19 8B 10 FF 98 A0 0C 1C BD 8A 0D 15 47 DF 41 20 DE B2 A9 62 C3 0F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: DF 96 16 7C ED 32 A7 94   52 5A 37 4E 98 1A 62 FC  .....2..RZ7N..b.
#           0010: D7 0E 8D 12 39 F4 E0 E1   65 30 38 0C E2 DE B6 6E  ....9...e08....n
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.809 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.809 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.809 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.810 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.810 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.810 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.810 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.811 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.812 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.812 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.816 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.816 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.816 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.816 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.817 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.817 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.817 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.817 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.817 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.817 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 04:55:17.817 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 04:55:17.817 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.817 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.817 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.845 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.847 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.857 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.860 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.860 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.861 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.861 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.861 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.861 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.861 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 04:55:17.861 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 04:55:17.861 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.862 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.863 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.863 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.863 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.864 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.864 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 04:55:17.864 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.879 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 10 3E 42",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 04:54:57.000 UTC",
#       "not  after"         : "2024-01-15 04:54:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 64 BD E5 A7 67 D5 83 2E   03 61 35 D4 F7 3F 05 BF  d...g....a5..?..
#           0010: 67 C5 1C BA                                        g...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 FF C2 7A 2A 9F 27 77   B6 E5 9E FD B3 56 B8 E0  `..z*.'w.....V..
#           0010: 09 25 E8 35                                        .%.5
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.880 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.951 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 96 ED E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 04:54:54.000 UTC",
#     "not  after"         : "2024-01-15 04:54:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D1 F2 A6 F8 3C 3A 42 DD   DD 43 12 3F 87 0C 8C FF  ....<:B..C.?....
#         0010: A9 58 52 CD                                        .XR.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 64 BD E5 A7 67 D5 83 2E   03 61 35 D4 F7 3F 05 BF  d...g....a5..?..
#         0010: 67 C5 1C BA                                        g...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.954 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6F 93 47 31 57 BD 4F BC   66 FA 2B EE 87 1F C5 E7  o.G1W.O.f.+.....
#     0010: 94 8D 40 B4 24 B9 CA 2B   12 59 82 68 8E DB C9 D6  ..@.$..+.Y.h....
#     0020: F2 F6 70 A3 6F C7 36 EA   A6 CF 5F 75 DC C5 D9 4F  ..p.o.6..._u...O
#     0030: 66 BD 99 9B 9A E1 9A A1   01 A7 64 6D 8B DF 33 C7  f.........dm..3.
#     0040: 7F 5E 8B 39 0E 85 29 7B   D2 38 7B CD 4A AD A3 C4  .^.9..)..8..J...
#     0050: 70 77 49 87 0C 72 D8 BA   94 A7 CE 64 36 A7 8B 3B  pwI..r.....d6..;
#     0060: CA C1 16 9E 7E AF 57 A7   28 1D 70 B2 26 44 FB 94  ......W.(.p.&D..
#     0070: 22 97 15 ED 9C 49 EA B7   84 1F CF D6 9A E5 51 D8  "....I........Q.
#     0080: D8 13 DD 0F 40 40 8D 34   68 AF 07 9A 50 1F 2A C7  ....@@.4h...P.*.
#     0090: FD 9A 41 49 B3 2F 09 E7   C7 9A 0B 04 D3 C8 CE 81  ..AI./..........
#     00A0: 27 D0 35 B8 C3 AF 3D B3   F6 6E 5A F3 7E 6F 90 3D  '.5...=..nZ..o.=
#     00B0: 0A FA 95 F0 8F C9 BC 0D   36 B2 C9 98 16 56 8D 46  ........6....V.F
#     00C0: 2B 44 01 0D 2F DD F2 FD   A8 69 81 F5 3D 8C 27 32  +D../....i..=.'2
#     00D0: EA 55 34 AF BA 73 45 A4   2A 57 3F 12 ED 7C 35 DD  .U4..sE.*W?...5.
#     00E0: 1B 0C 0A 4B 58 1A F2 20   88 78 BB AD ED 92 8D 19  ...KX.. .x......
#     00F0: 76 7B 19 3D D9 A7 E3 B1   5A BB E7 18 FD 75 6E 95  v..=....Z....un.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.956 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FB 85 20 A4 70 38 D1 8D   11 99 2D 17 61 53 D1 03  .. .p8....-.aS..
#     0010: 6F 31 1A 35 DE 7A 11 68   8E 6F CA B5 A1 35 A6 44  o1.5.z.h.o...5.D
#     0020: B5 A1 25 38 06 4F 92 22   55 D5 EA 2B 61 00 49 7B  ..%8.O."U..+a.I.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.957 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 04:55:17.958 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 04:55:17.958 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 04:55:17.958 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 04:55:17.959 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 04:55:17.959 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 04:55:17.959 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 04:55:17.959 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|D

[...truncated too long message...]

not  after"         : "2024-01-15 04:55:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 24 62 55 EF 7C D3 26   ED 40 7D 92 DD 87 86 E4  .$bU...&.@......
#         0010: 3F 1C 79 1E                                        ?.y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 11 3C 42 E8 90 95 02   21 47 5E 4B 8C 19 6C 07  ..<B....!G^K..l.
#         0010: C2 38 E9 00                                        .8..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1E 7E F4 CB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 04:55:32.000 UTC",
#     "not  after"         : "2024-01-15 04:55:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 24 62 55 EF 7C D3 26   ED 40 7D 92 DD 87 86 E4  .$bU...&.@......
#         0010: 3F 1C 79 1E                                        ?.y.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 04:56:06.210 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 04:56:06.319 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 04:56:06.319 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 04:56:06.321 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 04:56:06.321 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14191ms
ok 65 stop command for single port in 17826ms
not ok 66 status detects locally running solr in 3653ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 25909 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 4383 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 25909 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 249ms
ok 68 listing out files in 2836ms
ok 69 copying files around in 14363ms
ok 70 upconfig in 2831ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1220ms
not ok 73 Cleanup in 4620ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 25909 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 4383 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 25909 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 5m 43s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/ljjm3xw3oudee

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 841 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/841/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196740ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3774ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-17 01:09:05.015; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:09:05.065; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 6727ms
not ok 8 accept d option with builtin config in 5785ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-17 01:09:14.271; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:09:17.631; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 3547ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-17 01:09:20.011; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:09:21.171; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 4632ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-17 01:09:23.554; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:09:25.822; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2387ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-17 01:09:28.200; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:09:28.268; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2324ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-17 01:09:30.584; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:09:30.633; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2347ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-17 01:09:32.935; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:09:32.998; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3450ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-17 01:09:41.693; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:09:41.747; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2334ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-17 01:09:44.047; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:09:44.099; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2305ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-17 01:09:46.380; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:09:46.433; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 6681ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-17 01:09:48.680; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:09:53.136; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 27620ms
ok 19 Check export command in 22452ms
ok 20 export fails on non cloud mode in 8732ms
not ok 21 using curl to extract a single pdf file in 12034ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 39703 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39703 (pid=21443). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-17 01:11:00.888; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:11:04.242; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8404ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 39703 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39703 (pid=21897). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-17 01:11:12.625; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:11:12.679; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8275ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 39703 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39703 (pid=22320). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-17 01:11:20.946; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:11:20.999; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30581ms
ok 25 start help flag prints help in 166ms
ok 26 stop help flag prints help in 162ms
ok 27 restart help flag prints help in 169ms
ok 28 status help flag prints help in 52ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 159ms
ok 30 create help flag prints help in 169ms
ok 31 createcore help flag prints help in 168ms
ok 32 createcollection help flag prints help in 168ms
ok 33 delete help flag prints help in 163ms
ok 34 version help flag prints help in 52ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 164ms
ok 36 auth help flag prints help in 163ms
ok 37 assert help flag prints help in 956ms
ok 38 post help flag prints help in 930ms
not ok 39 SQL Module in 11251ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:39703/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-17 01:12:05.776; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:12:06.932; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:39703/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 23436ms
not ok 41 icu collation in analysis-extras module in 10962ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-17 01:12:39.121; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:12:41.392; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1311ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 4383 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10107ms
not ok 44 deploying and undeploying a collection level package in 196507ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 39703 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39703 (pid=26612). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 16193ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-17 01:16:20.133; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:16:22.395; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-17 01:16:23.414; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:16:25.688; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 11376ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-17 01:16:35.935; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:16:35.991; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-17 01:16:37.041; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:16:37.093; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3921ms
not ok 48 basic post with a type specified in 1331ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1211ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1236ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1259ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1341ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1333ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1324ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 4174ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-17 01:17:04.876; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:17:04.932; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 3508ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-17 01:17:07.313; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:17:08.476; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 13014ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:39703/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-Ur0gf8%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-17 01:17:20.387; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 01:17:21.546; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:39703/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-Ur0gf8%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
ok 58 start solr with ssl in 24517ms
not ok 59 use different hostname when not checking peer-name in 16652ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 39703 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39703 (pid=1816). Happy searching!
#
#     INFO  - 2023-10-17 01:17:54.243; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 01:17:54.251; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 01:17:55.253; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-Ur0gf8/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ur0gf8/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 01:17:55.345; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-Ur0gf8/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ur0gf8/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 01:17:55.351; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-Ur0gf8/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ur0gf8/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-17 01:17:59.836; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-17 01:17:59.840; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-17 01:18:00.719; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-Ur0gf8/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ur0gf8/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-17 01:18:00.721; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-Ur0gf8/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ur0gf8/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-17 01:18:02.275; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 01:18:02.283; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-17 01:18:02.908; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@2f2bf0e2[provider=null,keyStore=file:///tmp/bats-run-Ur0gf8/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ur0gf8/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 01:18:02.910; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@2f2bf0e2[provider=null,keyStore=file:///tmp/bats-run-Ur0gf8/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ur0gf8/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 13626ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 39703 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39703 (pid=4072). Happy searching!
#
#     INFO  - 2023-10-17 01:18:11.457; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 01:18:11.462; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-17 01:18:15.427; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 01:18:15.432; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 61 start solr with client truststore and security manager in 23941ms
ok 62 start solr with mTLS needed in 67346ms
ok 63 start solr with mTLS wanted in 50814ms
ok 64 SOLR-11740 check 'solr stop' connection in 14959ms
ok 65 stop command for single port in 17392ms
not ok 66 status detects locally running solr in 3812ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 25909 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 4383 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 25909 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 252ms
ok 68 listing out files in 4028ms
ok 69 copying files around in 7641ms
ok 70 upconfig in 2844ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1241ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1227ms
not ok 73 Cleanup in 4819ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 25909 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 4383 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 25909 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 5m 53s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/ehszqxqgs6bta

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 840 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/840/

All tests passed

Build Log:
[...truncated 1167 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196650ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3354ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-16 22:50:18.517; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:50:18.580; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 5639ms
not ok 8 accept d option with builtin config in 2404ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-16 22:50:26.623; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:50:26.675; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2429ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-16 22:50:29.070; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:50:29.127; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 6857ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-16 22:50:31.533; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:50:36.007; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 4570ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-16 22:50:38.309; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:50:40.583; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2352ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-16 22:50:42.940; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:50:42.991; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 3453ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-16 22:50:45.302; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:50:46.461; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3367ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-16 22:50:55.128; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:50:55.187; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 5691ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-16 22:50:57.525; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:51:00.882; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 4624ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-16 22:51:03.289; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:51:05.577; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2358ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-16 22:51:07.911; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:51:07.965; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 25427ms
ok 19 Check export command in 22569ms
ok 20 export fails on non cloud mode in 8932ms
not ok 21 using curl to extract a single pdf file in 13080ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 36361 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36361 (pid=3067). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-16 22:52:13.798; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:52:18.256; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8487ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 36361 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36361 (pid=3542). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-16 22:52:26.722; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:52:26.776; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 14157ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 36361 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36361 (pid=3974). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-16 22:52:35.374; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:52:40.934; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30205ms
ok 25 start help flag prints help in 184ms
ok 26 stop help flag prints help in 187ms
ok 27 restart help flag prints help in 174ms
ok 28 status help flag prints help in 54ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 171ms
ok 30 create help flag prints help in 169ms
ok 31 createcore help flag prints help in 179ms
ok 32 createcollection help flag prints help in 172ms
ok 33 delete help flag prints help in 169ms
ok 34 version help flag prints help in 55ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 172ms
ok 36 auth help flag prints help in 171ms
ok 37 assert help flag prints help in 979ms
ok 38 post help flag prints help in 955ms
ok 39 SQL Module in 16979ms
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 20140ms
ok 41 icu collation in analysis-extras module in 14173ms
not ok 42 package detects no running solr in 1347ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 4383 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10072ms
ok 44 deploying and undeploying a collection level package in 13475ms
ok 45 Affinity placement plugin using sysprop in 18143ms
ok 46 Random placement plugin using ENV in 17635ms
ok 47 Check help command in 3934ms
not ok 48 basic post with a type specified in 1329ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1239ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1248ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1248ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1335ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1327ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1343ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 4810ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-16 22:55:35.068; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:55:36.225; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2434ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-16 22:55:38.651; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:55:38.707; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 14602ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:36361/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-yBJai7%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-16 22:55:48.928; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 22:55:53.387; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:36361/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-yBJai7%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12610ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 36361 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36361 (pid=13124). Happy searching!
#
#     INFO  - 2023-10-16 22:56:00.805; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 22:56:00.816; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 22:56:01.213; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-yBJai7/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yBJai7/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 22:56:04.240; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 22:56:04.244; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-16 22:56:05.782; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 22:56:05.786; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12787ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 36361 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36361 (pid=13843). Happy searching!
#
#     INFO  - 2023-10-16 22:56:13.365; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 22:56:13.370; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 22:56:13.850; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-yBJai7/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yBJai7/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 22:56:14.001; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-yBJai7/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yBJai7/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 22:56:14.001; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-yBJai7/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yBJai7/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 22:56:16.812; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 22:56:16.817; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-16 22:56:17.265; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@355e34c7[provider=null,keyStore=file:///tmp/bats-run-yBJai7/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yBJai7/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-16 22:56:17.266; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@355e34c7[provider=null,keyStore=file:///tmp/bats-run-yBJai7/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yBJai7/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-16 22:56:18.400; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 22:56:18.405; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-16 22:56:18.829; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-yBJai7/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yBJai7/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 22:56:18.831; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-yBJai7/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yBJai7/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10896ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 36361 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36361 (pid=14420). Happy searching!
#
#     INFO  - 2023-10-16 22:56:26.529; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 22:56:26.533; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-16 22:56:29.248; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 22:56:29.254; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13518ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-16 22:56:38.217; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 22:56:41.681; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-16 22:56:43.135; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 43515ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-yBJai7/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 36361 [|]   [/]   [-]   [\]
# Started Solr server on port 36361 (pid=16010). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 36362 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36362 (pid=16117). Happy searching!
#
#     INFO  - 2023-10-16 22:57:07.848; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 22:57:07.852; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 22:57:08.229; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6256ac4f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-yBJai7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-yBJai7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 22:57:08.231; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-yBJai7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-yBJai7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 22:57:08.231; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(ca,h=[localhost],a=[],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-yBJai7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-yBJai7/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 22:57:08.271 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 8C 59 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 22:56:55.000 UTC",
#     "not  after"         : "2024-01-14 22:56:55.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 5B E0 CF 89 B0 47 74   F5 50 E9 9C 65 5A 4F C7  o[....Gt.P..eZO.
#         0010: 84 8F 83 FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 64 A6 1F E9 00 D9 DF   8A 2D 4F DF C4 61 B5 AA  kd.......-O..a..
#         0010: 29 58 49 65                                        )XIe
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 B0 0C C8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 22:56:48.000 UTC",
#     "not  after"         : "2024-01-14 22:56:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 A0 DC 1B C3 FF CC 66   C1 5D 23 A6 66 BF 88 12  .......f.]#.f...
#         0010: 71 C4 D7 56                                        q..V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 5B E0 CF 89 B0 47 74   F5 50 E9 9C 65 5A 4F C7  o[....Gt.P..eZO.
#         0010: 84 8F 83 FC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 22:57:08.275 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 6D 0A C2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 22:56:46.000 UTC",
#     "not  after"         : "2024-01-14 22:56:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 A0 DC 1B C3 FF CC 66   C1 5D 23 A6 66 BF 88 12  .......f.]#.f...
#         0010: 71 C4 D7 56                                        q..V
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 B0 0C C8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 22:56:48.000 UTC",
#     "not  after"         : "2024-01-14 22:56:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 A0 DC 1B C3 FF CC 66   C1 5D 23 A6 66 BF 88 12  .......f.]#.f...
#         0010: 71 C4 D7 56                                        q..V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 5B E0 CF 89 B0 47 74   F5 50 E9 9C 65 5A 4F C7  o[....Gt.P..eZO.
#         0010: 84 8F 83 FC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 22:57:08.286 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 22:57:08.458 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 22:57:08.458 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 22:57:08.459 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 22:57:08.459 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 22:57:08.464 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 22:57:08.475 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 22:57:08.475 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 22:57:08.475 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 22:57:08.477 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "40 EE F0 A8 9C BA 1E 17 F9 B7 57 3F 99 26 74 CF A9 B1 6F 9F 1F 1B 6E A0 56 D3 68 07 44 75 83 67",
#   "session id"          : "B8 C6 44 E3 E7 F4 68 E5 31 09 25 31 12 4B E0 D0 64 11 55 CA 67 7B C8 FC 60 B1 8C 26 43 12 D6 6E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 09 9C 49 F0 5F DA 3F 45   93 56 07 3A 1D 9D D2 36  ..I._.?E.V.:...6
#             0010: 4F FF 9B 3D FD 0C 68 47   81 2F F9 C6 4A 2C 2E 35  O..=..hG./..J,.5
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.599 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "48 D9 77 91 5D E9 D6 04 2C CD F1 D2 6C 7B 16 02 B3 BB F3 37 34 26 10 D9 EB 59 57 6B B2 E1 EC 2A",
#   "session id"          : "B8 C6 44 E3 E7 F4 68 E5 31 09 25 31 12 4B E0 D0 64 11 55 CA 67 7B C8 FC 60 B1 8C 26 43 12 D6 6E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6C A5 3B 39 7E F5 32 68   B9 3B 9D 24 B7 6E 2D D9  l.;9..2h.;.$.n-.
#           0010: 3A A2 82 55 9B 72 7C 11   9B 63 E1 19 CD D5 50 62  :..U.r...c....Pb
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.600 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.600 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.602 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.602 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.604 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.604 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.609 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.609 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.609 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.610 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.610 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.610 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.610 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.610 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.610 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.610 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 22:57:08.610 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 22:57:08.610 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.610 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.611 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.622 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.629 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.630 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.633 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.633 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.633 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.639 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.639 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.639 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.639 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 22:57:08.639 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 22:57:08.639 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.641 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.641 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.641 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.641 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.642 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.642 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 22:57:08.643 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.650 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 06 EE 3E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 22:56:51.000 UTC",
#       "not  after"         : "2024-01-14 22:56:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 5B E0 CF 89 B0 47 74   F5 50 E9 9C 65 5A 4F C7  o[....Gt.P..eZO.
#           0010: 84 8F 83 FC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FB 23 77 E9 27 24 4F 63   C2 06 15 47 D6 C9 43 51  .#w.'$Oc...G..CQ
#           0010: 06 DA BD E1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:08.651 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:09.064 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 B0 0C C8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 22:56:48.000 UTC",
#     "not  after"         : "2024-01-14 22:56:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 A0 DC 1B C3 FF CC 66   C1 5D 23 A6 66 BF 88 12  .......f.]#.f...
#         0010: 71 C4 D7 56                                        q..V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 5B E0 CF 89 B0 47 74   F5 50 E9 9C 65 5A 4F C7  o[....Gt.P..eZO.
#         0010: 84 8F 83 FC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:09.068 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A2 35 2A 57 D3 B8 89 D8   7C 87 EC F0 CB F2 95 24  .5*W...........$
#     0010: 64 56 01 65 CA 27 16 5A   29 FF 30 65 71 B4 E4 2C  dV.e.'.Z).0eq..,
#     0020: E2 CF FB BE AA 9E C1 C2   63 BD C4 20 39 E5 30 4D  ........c.. 9.0M
#     0030: 26 43 4B 61 2F AC E4 CB   8D 36 29 C5 0C 64 0F F9  &CKa/....6)..d..
#     0040: 5E F2 45 03 46 3F 35 7F   66 EB 70 31 03 FD EE 53  ^.E.F?5.f.p1...S
#     0050: 4D 4D 72 C3 0C 73 E9 AC   32 7F F4 9A BA 40 7E A8  MMr..s..2....@..
#     0060: 06 25 36 0C 6B 62 C6 7E   9F 8D BD 06 4C 9F 7E EE  .%6.kb......L...
#     0070: 19 C8 B4 CE E6 BA C8 64   52 25 DA 24 D2 EC FC FB  .......dR%.$....
#     0080: 0C 3A 0E 7D 0F BD F7 B2   41 94 28 F0 96 85 F5 67  .:......A.(....g
#     0090: 41 3A 5A A4 9D 89 21 97   C7 06 B6 0A BC 08 76 13  A:Z...!.......v.
#     00A0: AC 81 79 EA 50 4E 7F C7   85 8D 86 73 8B 8C C1 32  ..y.PN.....s...2
#     00B0: DE DC 79 1B D7 59 F2 15   62 9B 72 9C B1 19 48 44  ..y..Y..b.r...HD
#     00C0: 3A 3E F2 EA BB C6 C2 D9   38 E1 8A 09 B5 4E 47 65  :>......8....NGe
#     00D0: 4E D7 BE F1 8D 50 76 90   90 32 61 19 A2 98 8B F9  N....Pv..2a.....
#     00E0: 81 04 FA C2 59 F5 1D 4A   7D B3 50 28 25 07 AA 25  ....Y..J..P(%..%
#     00F0: B4 92 3E C4 3B C1 3C 21   57 11 D3 DB 6A 35 3F 43  ..>.;.<!W...j5?C
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:09.070 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4E 04 07 C1 21 A7 8C 3F   47 B8 ED F5 B1 D9 39 2D  N...!..?G.....9-
#     0010: FB 26 10 E4 CE 18 B7 53   C1 97 2C 10 EF 5C 3A F0  .&.....S..,..\:.
#     0020: 4B 56 EE F5 B9 B3 14 23   07 72 8A 3E 22 C1 C9 93  KV.....#.r.>"...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:09.071 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 22:57:09.072 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 22:57:09.072 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 22:57:09.072 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 22:57:09.072 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 22:57:09.073 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 22:57:09.073 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:09.073 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 22:57:09.075 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 8C 59 68",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 22:56:55.000 UTC",
#       "not  after"         : "2024-01-14 22:56:55.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 5B E0 CF 89 B0 47 74   F5 50 E9 9C 65 5A 4F C7  o[....Gt.P..eZO.
#           0010: 84 8F 83 FC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 64 A6 1F E9 00 D9 DF   8A 2D 4F DF C4 61 B5 AA  kd.......-O..a..
#           0010: 29 58 49 65                                        )XIe
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 B0 0C C8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 22:56:48.000 UTC",
#       "not  after"         : "2024-01-14 22:56:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 A0 DC 1B C3 FF CC 66   C1 5D 23 A6 66 BF 88 12  .......f.]#.f...
#           0010: 71 C4 D7 56                                        q..V
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#          

[...truncated too long message...]

   }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 22:58:01.433 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "56 00 E3 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 22:57:30.000 UTC",
#     "not  after"         : "2024-01-14 22:57:30.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 8C 17 4A E5 EB B6 AE   A1 D4 64 36 4C 5A A3 2D  *..J......d6LZ.-
#         0010: C7 0C 57 F4                                        ..W.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 21 1D E6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 22:57:32.000 UTC",
#     "not  after"         : "2024-01-14 22:57:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 8C 17 4A E5 EB B6 AE   A1 D4 64 36 4C 5A A3 2D  *..J......d6LZ.-
#         0010: C7 0C 57 F4                                        ..W.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 16 5A 3D DE 66 0A 17   CD 9B 20 96 04 9F D1 6A  ..Z=.f.... ....j
#         0010: AF 77 26 93                                        .w&.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 22:58:01.445 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14417ms
ok 65 stop command for single port in 17279ms
not ok 66 status detects locally running solr in 3821ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 25909 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 4383 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 25909 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 252ms
ok 68 listing out files in 9433ms
ok 69 copying files around in 9889ms
ok 70 upconfig in 3924ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1243ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1233ms
not ok 73 Cleanup in 4742ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 25909 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 4383 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 25909 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 5s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/4pqldmr3m4v7s

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 839 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/839/

All tests passed

Build Log:
[...truncated 1166 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196878ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3771ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-16 19:26:06.765; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:26:06.828; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1285ms
not ok 8 accept d option with builtin config in 2546ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-16 19:26:10.652; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:26:10.713; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2539ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-16 19:26:13.219; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:26:13.278; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2546ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-16 19:26:15.786; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:26:15.849; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2644ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-16 19:26:18.452; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:26:18.510; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2726ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-16 19:26:21.177; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:26:21.263; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2480ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-16 19:26:23.711; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:26:23.767; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 4270ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-16 19:26:33.281; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:26:33.335; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2438ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-16 19:26:35.731; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:26:35.794; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2508ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-16 19:26:38.254; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:26:38.324; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 3009ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-16 19:26:41.281; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:26:41.366; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 26219ms
ok 19 Check export command in 23020ms
ok 20 export fails on non cloud mode in 8890ms
not ok 21 using curl to extract a single pdf file in 9203ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 46333 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46333 (pid=1654024). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-16 19:27:48.892; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:27:48.993; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 9276ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 46333 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46333 (pid=1654507). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-16 19:27:58.212; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:27:58.285; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 9228ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 46333 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46333 (pid=1654931). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-16 19:28:07.447; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:28:07.509; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30937ms
ok 25 start help flag prints help in 175ms
ok 26 stop help flag prints help in 160ms
ok 27 restart help flag prints help in 170ms
ok 28 status help flag prints help in 49ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 164ms
ok 30 create help flag prints help in 223ms
ok 31 createcore help flag prints help in 167ms
ok 32 createcollection help flag prints help in 170ms
ok 33 delete help flag prints help in 164ms
ok 34 version help flag prints help in 48ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 165ms
ok 36 auth help flag prints help in 162ms
ok 37 assert help flag prints help in 999ms
ok 38 post help flag prints help in 985ms
not ok 39 SQL Module in 10542ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:46333/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-16 19:28:53.240; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:28:53.300; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:46333/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19602ms
not ok 41 icu collation in analysis-extras module in 8942ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-16 19:29:21.818; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:29:21.889; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1350ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10362ms
not ok 44 deploying and undeploying a collection level package in 196889ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 46333 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46333 (pid=1659054). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 12120ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-16 19:33:01.562; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:33:01.623; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-16 19:33:02.716; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:33:02.784; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 12139ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-16 19:33:13.714; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:33:13.772; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-16 19:33:14.877; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:33:14.937; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 4508ms
not ok 48 basic post with a type specified in 1440ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1337ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1369ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1281ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1454ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1415ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1468ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 4640ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-16 19:33:44.239; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:33:44.669; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2475ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-16 19:33:47.108; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:33:47.170; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10504ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:46333/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-MaRxqe%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-16 19:33:58.244; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 19:33:58.305; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:46333/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-MaRxqe%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 13447ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 46333 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46333 (pid=1665490). Happy searching!
#
#     INFO  - 2023-10-16 19:34:06.258; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 19:34:06.263; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 19:34:06.611; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-MaRxqe/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-MaRxqe/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 19:34:09.682; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 19:34:09.686; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-16 19:34:11.433; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 19:34:11.438; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13600ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 46333 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46333 (pid=1666101). Happy searching!
#
#     INFO  - 2023-10-16 19:34:19.590; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 19:34:19.595; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 19:34:20.101; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-MaRxqe/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-MaRxqe/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 19:34:20.221; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-MaRxqe/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-MaRxqe/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 19:34:20.222; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-MaRxqe/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-MaRxqe/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 19:34:23.333; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 19:34:23.338; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-16 19:34:23.771; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@782a4fff[provider=null,keyStore=file:///tmp/bats-run-MaRxqe/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-MaRxqe/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-16 19:34:23.772; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@782a4fff[provider=null,keyStore=file:///tmp/bats-run-MaRxqe/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-MaRxqe/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-16 19:34:25.050; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 19:34:25.055; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-16 19:34:25.498; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@355e34c7[provider=null,keyStore=file:///tmp/bats-run-MaRxqe/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-MaRxqe/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 19:34:25.500; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@355e34c7[provider=null,keyStore=file:///tmp/bats-run-MaRxqe/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-MaRxqe/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10898ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 46333 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46333 (pid=1666706). Happy searching!
#
#     INFO  - 2023-10-16 19:34:33.029; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 19:34:33.034; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-16 19:34:35.317; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 19:34:35.323; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 14262ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-16 19:34:45.121; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 19:34:48.754; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-16 19:34:50.305; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 38505ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-MaRxqe/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 46333 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46333 (pid=1668370). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 46334 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46334 (pid=1668480). Happy searching!
#
#     INFO  - 2023-10-16 19:35:17.349; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 19:35:17.365; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 19:35:18.189; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-MaRxqe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MaRxqe/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 19:35:18.193; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-MaRxqe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MaRxqe/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 19:35:18.193; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-MaRxqe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MaRxqe/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 19:35:18.249 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "39 72 85 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 19:35:03.000 UTC",
#     "not  after"         : "2024-01-14 19:35:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5C E5 8E 1B 98 AA 85 6D   6C EC 85 9D A7 34 C0 ED  \......ml....4..
#         0010: 30 AC 0A 38                                        0..8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 8C 60 8A 71 81 8A 67   4D 77 C6 F6 B3 32 D1 C7  ..`.q..gMw...2..
#         0010: 76 48 C0 53                                        vH.S
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D A5 B2 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 19:34:56.000 UTC",
#     "not  after"         : "2024-01-14 19:34:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C E6 B2 A8 9E 20 51 BF   9F 60 3C 31 4A 30 C6 78  <.... Q..`<1J0.x
#         0010: F8 04 92 78                                        ...x
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5C E5 8E 1B 98 AA 85 6D   6C EC 85 9D A7 34 C0 ED  \......ml....4..
#         0010: 30 AC 0A 38                                        0..8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 19:35:18.254 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 81 FE 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 19:34:53.000 UTC",
#     "not  after"         : "2024-01-14 19:34:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C E6 B2 A8 9E 20 51 BF   9F 60 3C 31 4A 30 C6 78  <.... Q..`<1J0.x
#         0010: F8 04 92 78                                        ...x
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D A5 B2 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 19:34:56.000 UTC",
#     "not  after"         : "2024-01-14 19:34:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C E6 B2 A8 9E 20 51 BF   9F 60 3C 31 4A 30 C6 78  <.... Q..`<1J0.x
#         0010: F8 04 92 78                                        ...x
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5C E5 8E 1B 98 AA 85 6D   6C EC 85 9D A7 34 C0 ED  \......ml....4..
#         0010: 30 AC 0A 38                                        0..8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 19:35:18.272 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 19:35:18.763 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 19:35:18.763 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 19:35:18.768 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 19:35:18.769 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 19:35:18.792 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 19:35:18.822 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 19:35:18.822 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 19:35:18.822 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 19:35:18.826 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7E 0B AB 75 91 55 DD 41 76 36 9B B9 F7 2C 3C C0 93 51 6D 17 22 03 59 79 C8 92 D6 BA 91 46 99 1E",
#   "session id"          : "B3 0F E1 24 4C 0D D4 16 F1 F2 E4 64 5A C0 A6 B5 7C D9 4F BE 8E D4 07 1E 8A DC 71 20 B6 FA 2D 2E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0F 0F 53 C6 A4 BF 08 99   E2 5B 5D E1 A9 BB DE EF  ..S......[].....
#             0010: 93 B2 F4 55 A7 FE 42 1F   F7 35 85 07 1E 1F 47 50  ...U..B..5....GP
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.097 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "75 0B 4B C6 83 92 64 C3 31 9B 6E D2 49 6B 90 FA D7 A6 80 4C 95 01 8E E1 B0 24 D0 75 58 49 EF 19",
#   "session id"          : "B3 0F E1 24 4C 0D D4 16 F1 F2 E4 64 5A C0 A6 B5 7C D9 4F BE 8E D4 07 1E 8A DC 71 20 B6 FA 2D 2E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F3 2F 7F 00 24 FF F7 E2   DA F3 00 AB 73 F5 F5 68  ./..$.......s..h
#           0010: A9 E3 D5 96 8C DE 42 9A   C9 A1 27 16 84 73 75 5C  ......B...'..su\
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.098 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.098 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.100 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.100 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.100 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.100 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.106 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.113 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.119 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.120 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.121 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.121 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.121 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 19:35:19.122 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 19:35:19.122 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.151 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.153 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.154 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.157 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.157 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.158 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.158 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.158 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 19:35:19.158 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 19:35:19.158 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.159 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.159 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.160 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.160 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.160 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.181 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 19:35:19.181 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.184 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "42 20 37 15",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 19:34:59.000 UTC",
#       "not  after"         : "2024-01-14 19:34:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5C E5 8E 1B 98 AA 85 6D   6C EC 85 9D A7 34 C0 ED  \......ml....4..
#           0010: 30 AC 0A 38                                        0..8
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8A 46 EB 32 8A F6 CC F5   49 4A ED 16 A9 F2 12 DB  .F.2....IJ......
#           0010: DB FD 0B 41                                        ...A
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.184 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 19:35:19.267 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 19:35:19.267 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 19:35:19.268 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 19:35:19.268 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.556 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D A5 B2 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 19:34:56.000 UTC",
#     "not  after"         : "2024-01-14 19:34:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C E6 B2 A8 9E 20 51 BF   9F 60 3C 31 4A 30 C6 78  <.... Q..`<1J0.x
#         0010: F8 04 92 78                                        ...x
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5C E5 8E 1B 98 AA 85 6D   6C EC 85 9D A7 34 C0 ED  \......ml....4..
#         0010: 30 AC 0A 38                                        0..8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.567 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 47 7A 79 CD 63 44 D5 67   0E 8D 01 69 3F 12 89 C7  Gzy.cD.g...i?...
#     0010: EC 29 5C 2D F2 7D 50 56   55 7B 98 45 BC 9F 3B 27  .)\-..PVU..E..;'
#     0020: 13 23 FC 04 06 5B 10 0A   71 96 0D 46 72 93 8F FB  .#...[..q..Fr...
#     0030: C3 98 AD 67 2C 9E 0B 4B   FD B6 D5 E4 C3 3A 46 A7  ...g,..K.....:F.
#     0040: 69 24 8A F3 88 E8 F2 24   55 46 29 24 B1 1D 35 44  i$.....$UF)$..5D
#     0050: 72 76 FF 02 48 E9 DC 2D   68 10 E9 2B 03 5D A0 2A  rv..H..-h..+.].*
#     0060: F5 3B 6D F9 30 D2 D3 B6   14 2F AB 91 F6 C7 87 77  .;m.0..../.....w
#     0070: 07 62 0D 9F 94 1B 23 5F   2D 25 54 88 F4 3A 9D CC  .b....#_-%T..:..
#     0080: 3D 97 00 88 C4 1D A6 32   C0 33 23 15 6F FE 7D FD  =......2.3#.o...
#     0090: E1 23 D1 DC 1F 8A 72 81   D4 AC 78 7A 80 66 7C 64  .#....r...xz.f.d
#     00A0: 8E CC C9 6C 8F 23 BD 4B   48 E4 22 61 DB 32 6B 97  ...l.#.KH."a.2k.
#     00B0: 95 DA ED 41 55 11 EF C5   D4 3F 5B 6B 1E 40 FD 90  ...AU....?[k.@..
#     00C0: 0D AD 63 CC 6B 79 F3 CB   62 AA 92 51 1B 00 45 90  ..c.ky..b..Q..E.
#     00D0: CF 98 CC 56 16 B0 65 B5   BE C8 D4 E8 54 21 D1 94  ...V..e.....T!..
#     00E0: 0A 40 30 FD 65 29 F0 2C   FC 6F 22 95 B6 AB 9D AB  .@0.e).,.o".....
#     00F0: A7 BA EB 35 67 08 BC 86   1A 6D A4 B2 55 29 3E 71  ...5g....m..U)>q
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 19:35:19.569 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C8 6D 3E 77 43 2D 00 4F   C7 C5 7E 2F 5C C7 1F 80  .m>wC-.O.../\...
#     0010: E8 11 83 E6 A0 66 B2 5F   5A F0 6

[...truncated too long message...]

lient (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A E4 C9 BA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 19:35:41.000 UTC",
#     "not  after"         : "2024-01-14 19:35:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 21 42 8A AF 52 03 6A B1   72 46 89 FA BA 04 1E 95  !B..R.j.rF......
#         0010: 2E 18 F4 FA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 FD 82 CB 81 AE 8C 75   62 85 3E 40 91 21 87 24  .......ub.>@.!.$
#         0010: 2D 28 55 32                                        -(U2
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 19:36:04.393 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 C2 69 C8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 19:35:32.000 UTC",
#     "not  after"         : "2024-01-14 19:35:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 C6 2F 88 58 0D 9B 08   BF 53 39 12 07 C1 54 6A  ../.X....S9...Tj
#         0010: 57 9B EA 1F                                        W...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 E4 3B 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 19:35:34.000 UTC",
#     "not  after"         : "2024-01-14 19:35:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 C6 2F 88 58 0D 9B 08   BF 53 39 12 07 C1 54 6A  ../.X....S9...Tj
#         0010: 57 9B EA 1F                                        W...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 21 42 8A AF 52 03 6A B1   72 46 89 FA BA 04 1E 95  !B..R.j.rF......
#         0010: 2E 18 F4 FA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 19:36:04.405 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 15128ms
ok 65 stop command for single port in 18344ms
not ok 66 status detects locally running solr in 1567ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 257ms
ok 68 listing out files in 3149ms
ok 69 copying files around in 6756ms
ok 70 upconfig in 2678ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1312ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1253ms
not ok 73 Cleanup in 2601ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 6m 53s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/3ijxaxjsqt7g2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 838 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/838/

All tests passed

Build Log:
[...truncated 1165 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196838ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3708ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-16 15:39:45.979; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:39:46.033; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1298ms
not ok 8 accept d option with builtin config in 2636ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-16 15:39:49.947; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:39:50.009; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2539ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-16 15:39:52.534; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:39:52.593; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2529ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-16 15:39:55.089; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:39:55.147; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2479ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-16 15:39:57.584; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:39:57.640; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2488ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-16 15:40:00.101; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:40:00.165; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2461ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-16 15:40:02.582; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:40:02.639; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3639ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-16 15:40:11.518; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:40:11.582; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2466ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-16 15:40:14.025; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:40:14.082; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2439ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-16 15:40:16.490; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:40:16.545; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2491ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-16 15:40:18.987; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:40:19.048; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 27017ms
ok 19 Check export command in 23112ms
ok 20 export fails on non cloud mode in 9608ms
not ok 21 using curl to extract a single pdf file in 8708ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 36265 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36265 (pid=1026686). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-16 15:41:28.200; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:41:28.275; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8881ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 36265 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36265 (pid=1027107). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-16 15:41:37.118; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:41:37.182; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 9093ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 36265 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36265 (pid=1027581). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-16 15:41:46.254; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:41:46.314; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30799ms
ok 25 start help flag prints help in 173ms
ok 26 stop help flag prints help in 181ms
ok 27 restart help flag prints help in 169ms
ok 28 status help flag prints help in 48ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 161ms
ok 30 create help flag prints help in 160ms
ok 31 createcore help flag prints help in 161ms
ok 32 createcollection help flag prints help in 169ms
ok 33 delete help flag prints help in 161ms
ok 34 version help flag prints help in 48ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 165ms
ok 36 auth help flag prints help in 168ms
ok 37 assert help flag prints help in 1024ms
ok 38 post help flag prints help in 996ms
not ok 39 SQL Module in 10436ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:36265/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-16 15:42:31.714; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:42:31.779; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:36265/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19362ms
not ok 41 icu collation in analysis-extras module in 8727ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-16 15:42:59.865; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:42:59.919; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1356ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10295ms
not ok 44 deploying and undeploying a collection level package in 196885ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 36265 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36265 (pid=1031673). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 12221ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-16 15:46:39.692; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:46:39.748; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-16 15:46:40.802; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:46:40.866; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 12476ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-16 15:46:51.651; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:46:51.707; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-16 15:46:52.810; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:46:52.864; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 4302ms
not ok 48 basic post with a type specified in 1450ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1298ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1329ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1352ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1444ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1417ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1433ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 3752ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-16 15:47:21.880; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:47:21.939; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2603ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-16 15:47:24.502; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:47:24.563; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10633ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:36265/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-9DPydy%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-16 15:47:35.247; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 15:47:35.303; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:36265/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-9DPydy%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 13357ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 36265 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36265 (pid=1038117). Happy searching!
#
#     INFO  - 2023-10-16 15:47:43.080; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 15:47:43.084; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 15:47:43.660; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-9DPydy/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9DPydy/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 15:47:46.776; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 15:47:46.781; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-16 15:47:48.441; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 15:47:48.446; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13426ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 36265 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36265 (pid=1038731). Happy searching!
#
#     INFO  - 2023-10-16 15:47:56.386; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 15:47:56.390; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 15:47:56.969; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-9DPydy/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9DPydy/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 15:47:57.084; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-9DPydy/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9DPydy/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 15:47:57.087; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-9DPydy/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9DPydy/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 15:48:00.097; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 15:48:00.103; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-16 15:48:00.564; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@1b11ef33[provider=null,keyStore=file:///tmp/bats-run-9DPydy/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9DPydy/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-16 15:48:00.565; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@1b11ef33[provider=null,keyStore=file:///tmp/bats-run-9DPydy/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9DPydy/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-16 15:48:01.820; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 15:48:01.825; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-16 15:48:02.259; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-9DPydy/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9DPydy/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 15:48:02.261; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-9DPydy/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-9DPydy/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 11300ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 36265 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36265 (pid=1039340). Happy searching!
#
#     INFO  - 2023-10-16 15:48:09.922; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 15:48:09.926; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-16 15:48:13.183; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 15:48:13.188; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 14337ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-16 15:48:22.325; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 15:48:26.030; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-16 15:48:27.556; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 40851ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-9DPydy/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 36265 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36265 (pid=1040965). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 36266 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 36266 (pid=1041077). Happy searching!
#
#     INFO  - 2023-10-16 15:48:53.651; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 15:48:53.660; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 15:48:54.682; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-9DPydy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9DPydy/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 15:48:54.685; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fd4acee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-9DPydy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9DPydy/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 15:48:54.686; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@165b8a71(ca,h=[localhost],a=[],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-9DPydy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9DPydy/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 15:48:54.790 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A 76 37 E6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 15:48:39.000 UTC",
#     "not  after"         : "2024-01-14 15:48:39.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 54 D8 28 E6 55 F9 D7   FF B4 3A 9F 98 7C 11 FA  =T.(.U....:.....
#         0010: 4B C8 9F 4B                                        K..K
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 00 3F DC 86 1D 0D F3 C7   69 10 EF 23 3D 79 39 EB  .?......i..#=y9.
#         0010: 3A C1 CE 07                                        :...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 55 E6 44",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 15:48:33.000 UTC",
#     "not  after"         : "2024-01-14 15:48:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 61 72 24 78 10 42 79   9E A7 83 81 78 C2 D1 CE  .ar$x.By....x...
#         0010: 27 96 E9 A8                                        '...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 54 D8 28 E6 55 F9 D7   FF B4 3A 9F 98 7C 11 FA  =T.(.U....:.....
#         0010: 4B C8 9F 4B                                        K..K
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 15:48:54.794 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E D4 07 63",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 15:48:31.000 UTC",
#     "not  after"         : "2024-01-14 15:48:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 61 72 24 78 10 42 79   9E A7 83 81 78 C2 D1 CE  .ar$x.By....x...
#         0010: 27 96 E9 A8                                        '...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 55 E6 44",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 15:48:33.000 UTC",
#     "not  after"         : "2024-01-14 15:48:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 61 72 24 78 10 42 79   9E A7 83 81 78 C2 D1 CE  .ar$x.By....x...
#         0010: 27 96 E9 A8                                        '...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 54 D8 28 E6 55 F9 D7   FF B4 3A 9F 98 7C 11 FA  =T.(.U....:.....
#         0010: 4B C8 9F 4B                                        K..K
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 15:48:54.820 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 15:48:55.427 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 15:48:55.427 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 15:48:55.433 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 15:48:55.433 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 15:48:55.439 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 15:48:55.463 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 15:48:55.464 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 15:48:55.464 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 15:48:55.467 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "8E 2A CD 1B 19 3B 8F A3 78 92 A1 11 79 CA 70 3C 4A CF CC 44 56 14 A6 65 0F FE 9B F5 8B 19 B1 1E",
#   "session id"          : "C0 6A 63 A0 67 1D EE 7F CA FA 9F BA 97 66 75 2C 5F 03 AA A9 67 E8 A7 62 42 DC EE DE 35 92 86 4D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 38 BC B5 14 06 9F 50 B9   59 BC 1D F2 3B 4A 4B 8F  8.....P.Y...;JK.
#             0010: DE 77 E0 41 94 69 44 66   91 A2 F1 8C D5 85 DF 17  .w.A.iDf........
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.649 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "5C 02 BE A9 C1 A2 BF F4 CB 82 59 EB 1B 98 3A 1B 71 F1 77 70 12 4A DD 62 3C 52 43 43 A6 D9 DD 0D",
#   "session id"          : "C0 6A 63 A0 67 1D EE 7F CA FA 9F BA 97 66 75 2C 5F 03 AA A9 67 E8 A7 62 42 DC EE DE 35 92 86 4D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 81 C9 00 4F 41 D8 89 80   59 37 0E 1A A1 F1 CF DA  ...OA...Y7......
#           0010: 0A 13 71 57 5E CC 1F 78   4D F0 C0 43 B5 73 EA 5C  ..qW^..xM..C.s.\
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.649 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.649 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.651 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.651 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.651 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.651 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.651 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.651 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.652 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.652 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.660 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.660 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.660 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.660 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.660 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.660 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 15:48:55.661 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 15:48:55.661 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.680 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.681 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.682 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.705 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.706 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.706 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.706 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.706 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 15:48:55.706 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 15:48:55.706 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.708 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.708 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.708 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.708 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.709 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.709 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 15:48:55.710 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.714 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 60 9B F4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 15:48:35.000 UTC",
#       "not  after"         : "2024-01-14 15:48:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D 54 D8 28 E6 55 F9 D7   FF B4 3A 9F 98 7C 11 FA  =T.(.U....:.....
#           0010: 4B C8 9F 4B                                        K..K
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 47 39 46 69 92 7C 8A E9   BB F6 82 27 94 9F 72 51  G9Fi.......'..rQ
#           0010: 9C 19 51 3D                                        ..Q=
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:55.714 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:56.225 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 55 E6 44",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 15:48:33.000 UTC",
#     "not  after"         : "2024-01-14 15:48:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 61 72 24 78 10 42 79   9E A7 83 81 78 C2 D1 CE  .ar$x.By....x...
#         0010: 27 96 E9 A8                                        '...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 54 D8 28 E6 55 F9 D7   FF B4 3A 9F 98 7C 11 FA  =T.(.U....:.....
#         0010: 4B C8 9F 4B                                        K..K
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:56.229 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3E 35 04 23 59 47 63 A6   65 90 A6 80 A0 3F D9 CC  >5.#YGc.e....?..
#     0010: D4 D3 A1 D7 47 BB BC 8E   F1 1D FF E7 DB AD CE 0F  ....G...........
#     0020: F9 1A 4D E5 68 96 F0 8C   21 B2 FC 93 EF AF F0 BD  ..M.h...!.......
#     0030: E2 61 62 7E A9 C4 19 4C   17 2E 84 CB E9 4D 81 1C  .ab....L.....M..
#     0040: 37 F4 F3 7F 77 22 9B 54   D2 12 A0 36 11 65 3D 64  7...w".T...6.e=d
#     0050: 84 ED EF 97 55 DA 20 4F   28 F1 D8 2D C1 E5 F5 FF  ....U. O(..-....
#     0060: 89 74 3A 61 54 24 93 6A   5A 40 63 0D 95 5A F5 DB  .t:aT$.jZ@c..Z..
#     0070: B0 86 F7 8A 4E 70 0F F3   EB BB 1A E0 9C CA 41 C0  ....Np........A.
#     0080: 2F BC EC AC D3 37 93 02   1A AC 79 F8 13 75 17 5D  /....7....y..u.]
#     0090: F1 7B 3D 51 88 41 DA EE   B2 02 86 2B 64 AB C2 F3  ..=Q.A.....+d...
#     00A0: 85 34 57 64 A5 17 C5 EF   3E 37 74 92 B7 AA 9F 19  .4Wd....>7t.....
#     00B0: B2 E5 88 86 AA BE CE 20   CB 1D 21 26 A5 F9 FA 25  ....... ..!&...%
#     00C0: 77 54 22 62 B7 1C 81 59   CA 74 C8 43 E7 CC ED A9  wT"b...Y.t.C....
#     00D0: 5B 75 F0 D0 36 AB D4 22   D1 7F 44 BE DB 78 FB 84  [u..6.."..D..x..
#     00E0: 2E 81 02 DD C9 47 A2 22   45 BB 67 1A D0 D6 9F C1  .....G."E.g.....
#     00F0: 91 6F 46 85 5A E3 DF 13   DA 1E 5D D7 51 E6 CE 17  .oF.Z.....].Q...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:56.230 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 13 99 DE 58 70 1C 7C BB   D0 E0 07 8D CB 46 BF BD  ...Xp........F..
#     0010: 3E 9E AB 3F B1 B0 82 CF   1F 06 23 F5 60 53 79 34  >..?......#.`Sy4
#     0020: 73 B1 77 62 C8 4A 72 1C   D3 78 84 DD 91 D8 93 86  s.wb.Jr..x......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 15:48:56.233 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 15:48:56.238 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|20

[...truncated too long message...]

lient (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 73 C2 40",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 15:49:21.000 UTC",
#     "not  after"         : "2024-01-14 15:49:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 AE DC 94 44 8B E1 2A   6F 13 B9 CF 42 8A C1 90  ....D..*o...B...
#         0010: 66 22 64 49                                        f"dI
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1A 40 8A 95 05 99 83 B9   2C 6B 0D 70 91 BA 99 87  .@......,k.p....
#         0010: 43 21 D6 E1                                        C!..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 15:49:43.704 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C FE 94 4E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 15:49:12.000 UTC",
#     "not  after"         : "2024-01-14 15:49:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AF 7D A5 FE EF 39 09 F4   34 26 59 B8 F7 53 DC 17  .....9..4&Y..S..
#         0010: E4 13 34 53                                        ..4S
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C 69 2D D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 15:49:14.000 UTC",
#     "not  after"         : "2024-01-14 15:49:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AF 7D A5 FE EF 39 09 F4   34 26 59 B8 F7 53 DC 17  .....9..4&Y..S..
#         0010: E4 13 34 53                                        ..4S
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 AE DC 94 44 8B E1 2A   6F 13 B9 CF 42 8A C1 90  ....D..*o...B...
#         0010: 66 22 64 49                                        f"dI
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 15:49:43.716 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14591ms
ok 65 stop command for single port in 18271ms
not ok 66 status detects locally running solr in 1545ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 247ms
ok 68 listing out files in 2920ms
ok 69 copying files around in 6736ms
ok 70 upconfig in 2599ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1264ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1281ms
not ok 73 Cleanup in 2518ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 31s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/yridxcv6o23wk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 837 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/837/

All tests passed

Build Log:
[...truncated 1164 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196716ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3281ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-16 12:59:55.792; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 12:59:55.842; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1244ms
not ok 8 accept d option with builtin config in 2358ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-16 12:59:59.428; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 12:59:59.491; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 4774ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-16 13:00:01.968; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:00:04.273; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2605ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-16 13:00:06.847; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:00:06.903; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2497ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-16 13:00:09.394; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:00:09.447; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 5660ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-16 13:00:11.760; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:00:15.130; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 5675ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-16 13:00:17.468; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:00:20.839; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 4487ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-16 13:00:29.437; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:00:30.593; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2288ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-16 13:00:32.880; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:00:32.937; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2348ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-16 13:00:35.263; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:00:35.316; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2352ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-16 13:00:37.639; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:00:37.699; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 23815ms
ok 19 Check export command in 22697ms
ok 20 export fails on non cloud mode in 9959ms
not ok 21 using curl to extract a single pdf file in 11849ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 43307 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43307 (pid=1002). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-16 13:01:42.746; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:01:46.280; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8532ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 43307 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43307 (pid=1517). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-16 13:01:54.757; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:01:54.810; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8633ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 43307 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43307 (pid=1958). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-16 13:02:03.403; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:02:03.457; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 31277ms
ok 25 start help flag prints help in 173ms
ok 26 stop help flag prints help in 181ms
ok 27 restart help flag prints help in 172ms
ok 28 status help flag prints help in 55ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 168ms
ok 30 create help flag prints help in 183ms
ok 31 createcore help flag prints help in 177ms
ok 32 createcollection help flag prints help in 168ms
ok 33 delete help flag prints help in 167ms
ok 34 version help flag prints help in 53ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 177ms
ok 36 auth help flag prints help in 172ms
ok 37 assert help flag prints help in 936ms
ok 38 post help flag prints help in 950ms
not ok 39 SQL Module in 12197ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:43307/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-16 13:02:48.898; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:02:51.166; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:43307/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 21364ms
ok 41 icu collation in analysis-extras module in 13691ms
not ok 42 package detects no running solr in 1323ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4383 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9875ms
ok 44 deploying and undeploying a collection level package in 13871ms
ok 45 Affinity placement plugin using sysprop in 20035ms
ok 46 Random placement plugin using ENV in 16037ms
ok 47 Check help command in 4122ms
ok 48 basic post with a type specified in 5761ms
ok 49 basic post WITHOUT a type specified in 12657ms
ok 50 crawling a directory in 4916ms
ok 51 crawling a web site in 5171ms
ok 52 commit and optimize and delete in 4159ms
ok 53 args mode in 6820ms
ok 54 stdin mode in 3671ms
not ok 55 post solr log into solr via script in 3424ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-16 13:05:29.027; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:05:29.081; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2410ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-16 13:05:31.462; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:05:31.517; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 11644ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:43307/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-8msZYN%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-16 13:05:42.053; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 13:05:43.208; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:43307/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-8msZYN%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 13092ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 43307 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43307 (pid=12199). Happy searching!
#
#     INFO  - 2023-10-16 13:05:50.953; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 13:05:50.958; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 13:05:51.379; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-8msZYN/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-8msZYN/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 13:05:54.496; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 13:05:54.501; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-16 13:05:56.010; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 13:05:56.015; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13472ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 43307 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43307 (pid=12748). Happy searching!
#
#     INFO  - 2023-10-16 13:06:04.061; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 13:06:04.066; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 13:06:04.461; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-8msZYN/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-8msZYN/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 13:06:04.563; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-8msZYN/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-8msZYN/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 13:06:04.563; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-8msZYN/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-8msZYN/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 13:06:07.697; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 13:06:07.702; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-16 13:06:08.312; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@46c670a6[provider=null,keyStore=file:///tmp/bats-run-8msZYN/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-8msZYN/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-16 13:06:08.315; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@46c670a6[provider=null,keyStore=file:///tmp/bats-run-8msZYN/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-8msZYN/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-16 13:06:09.563; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 13:06:09.567; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-16 13:06:10.023; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@21ec5d87[provider=null,keyStore=file:///tmp/bats-run-8msZYN/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-8msZYN/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 13:06:10.025; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@21ec5d87[provider=null,keyStore=file:///tmp/bats-run-8msZYN/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-8msZYN/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10463ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 43307 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43307 (pid=13339). Happy searching!
#
#     INFO  - 2023-10-16 13:06:17.264; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 13:06:17.269; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-16 13:06:19.613; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 13:06:19.619; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13671ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-16 13:06:28.773; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 13:06:32.139; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-16 13:06:33.868; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 37632ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-8msZYN/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 43307 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43307 (pid=14953). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 43308 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43308 (pid=15063). Happy searching!
#
#     INFO  - 2023-10-16 13:06:59.921; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 13:06:59.926; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 13:07:00.387; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-8msZYN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8msZYN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 13:07:00.389; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-8msZYN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8msZYN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 13:07:00.390; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-8msZYN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8msZYN/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 13:07:00.429 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 9E 7E 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 13:06:45.000 UTC",
#     "not  after"         : "2024-01-14 13:06:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 75 89 E3 F7 3E E5 01   90 56 6D 38 0F 60 BE 83  Yu...>...Vm8.`..
#         0010: 82 A8 DF A4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 A8 C6 45 E3 99 1D BB   19 F9 A1 D7 B8 48 D5 F5  ...E.........H..
#         0010: E9 E9 9E 6F                                        ...o
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 82 EC 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 13:06:39.000 UTC",
#     "not  after"         : "2024-01-14 13:06:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 C9 47 23 ED 0C 66 D4   93 08 B5 AF 56 6C F5 F6  ..G#..f.....Vl..
#         0010: D1 26 53 79                                        .&Sy
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 75 89 E3 F7 3E E5 01   90 56 6D 38 0F 60 BE 83  Yu...>...Vm8.`..
#         0010: 82 A8 DF A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 13:07:00.433 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 82 EC 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 13:06:39.000 UTC",
#     "not  after"         : "2024-01-14 13:06:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 C9 47 23 ED 0C 66 D4   93 08 B5 AF 56 6C F5 F6  ..G#..f.....Vl..
#         0010: D1 26 53 79                                        .&Sy
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 75 89 E3 F7 3E E5 01   90 56 6D 38 0F 60 BE 83  Yu...>...Vm8.`..
#         0010: 82 A8 DF A4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 51 5F 9E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 13:06:37.000 UTC",
#     "not  after"         : "2024-01-14 13:06:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 C9 47 23 ED 0C 66 D4   93 08 B5 AF 56 6C F5 F6  ..G#..f.....Vl..
#         0010: D1 26 53 79                                        .&Sy
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 13:07:00.445 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 13:07:00.823 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 13:07:00.823 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 13:07:00.826 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 13:07:00.827 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 13:07:00.834 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 13:07:00.847 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 13:07:00.848 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 13:07:00.848 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 13:07:00.854 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "52 6C 81 55 17 DA AB 19 54 41 39 D9 D7 9B E3 82 CE B0 9C FB B2 26 31 A8 14 EE 42 AD E0 36 DF 64",
#   "session id"          : "7D 28 AF F1 78 80 76 83 D4 4F 9E 78 83 F6 BD 5D F1 84 AA AE DB 12 D1 54 AB 79 43 11 EE 3E 1F 00",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8C 86 EE 6D B7 C7 14 D3   58 9D B6 63 B2 59 20 DA  ...m....X..c.Y .
#             0010: BA AE 0B C4 F4 5F EF AD   04 80 31 A4 3E F8 B4 5A  ....._....1.>..Z
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.938 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "98 9A 10 A0 90 42 98 E4 BB 2D 0B A9 6D 19 44 AF 8F F2 C7 CA A9 86 08 54 6A 1B B9 FD 53 B2 33 D8",
#   "session id"          : "7D 28 AF F1 78 80 76 83 D4 4F 9E 78 83 F6 BD 5D F1 84 AA AE DB 12 D1 54 AB 79 43 11 EE 3E 1F 00",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 20 FC 0A A1 86 AB D1 93   FF B8 26 6B F0 B1 30 3C   .........&k..0<
#           0010: 18 FE 71 9E 4C B6 47 18   B5 C1 6D 33 8D C4 1E 3B  ..q.L.G...m3...;
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.938 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.938 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.939 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.939 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.939 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.939 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.939 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.939 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.939 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.940 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.941 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.941 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.942 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 13:07:00.943 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 13:07:00.943 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.943 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.943 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.954 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.955 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.956 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.959 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.959 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.959 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.960 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.960 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.960 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.960 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 13:07:00.960 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 13:07:00.960 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.962 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.962 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.962 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.962 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.963 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.964 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 13:07:00.964 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.966 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D A0 BD 70",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 13:06:41.000 UTC",
#       "not  after"         : "2024-01-14 13:06:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 75 89 E3 F7 3E E5 01   90 56 6D 38 0F 60 BE 83  Yu...>...Vm8.`..
#           0010: 82 A8 DF A4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F8 05 8D 41 D2 55 CF 9D   48 A8 AB BF 1F F1 8F 6E  ...A.U..H......n
#           0010: 69 F0 30 44                                        i.0D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:00.966 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:01.021 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 82 EC 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 13:06:39.000 UTC",
#     "not  after"         : "2024-01-14 13:06:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 C9 47 23 ED 0C 66 D4   93 08 B5 AF 56 6C F5 F6  ..G#..f.....Vl..
#         0010: D1 26 53 79                                        .&Sy
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 75 89 E3 F7 3E E5 01   90 56 6D 38 0F 60 BE 83  Yu...>...Vm8.`..
#         0010: 82 A8 DF A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:01.024 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 09 60 15 71 0B DA BB D4   AC EF 36 D3 06 04 CA 25  .`.q......6....%
#     0010: 2D 44 68 3F 04 61 D0 BE   25 46 DE EA 69 B9 6B F6  -Dh?.a..%F..i.k.
#     0020: 22 30 77 8D 9C 0E CA E4   EE 27 59 3A 51 E0 5E 20  "0w......'Y:Q.^
#     0030: 0D A4 DE 3C 7A 2C 1E 5F   9B 0D A8 56 94 EE A2 0E  ...<z,._...V....
#     0040: 55 09 CA 84 77 EC CF 40   A5 06 F2 72 28 61 A7 54  U...w..@...r(a.T
#     0050: 61 D4 47 83 97 40 3C 96   8D D5 00 64 4B D3 54 3D  a.G..@<....dK.T=
#     0060: FB 46 DC D0 63 5F 55 A1   FF 72 69 E5 64 84 7A E8  .F..c_U..ri.d.z.
#     0070: C2 44 79 41 96 0D 66 C9   E2 BE 07 75 31 20 F1 A4  .DyA..f....u1 ..
#     0080: 90 4B AE 9E 1D 2E 2D 1C   AE 23 27 5B 53 4F A8 1E  .K....-..#'[SO..
#     0090: 6F E5 2B C7 55 F5 C7 BA   7F 96 12 BC B4 7A A1 2A  o.+.U........z.*
#     00A0: 79 50 9A F2 5C D2 C1 A5   75 8E 21 0F D9 F5 43 F9  yP..\...u.!...C.
#     00B0: 0F 18 1C 1B 57 59 73 42   95 35 E2 A7 93 9E 35 9D  ....WYsB.5....5.
#     00C0: E1 64 02 F4 DE 43 00 4E   A7 A1 EB BD 10 15 D4 C4  .d...C.N........
#     00D0: CA E7 C0 6B 67 7B BC 4E   34 18 F4 80 B6 1C 02 B7  ...kg..N4.......
#     00E0: E8 4C 2B B9 8D A8 6A DA   CC 6E 7F 16 34 26 81 B8  .L+...j..n..4&..
#     00F0: 8D 95 90 9E E2 7F AE 1A   F4 1C 23 71 52 0B 3F 91  ..........#qR.?.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:01.027 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 52 30 A6 67 35 61 BF EE   A3 FF F7 E2 00 AE F6 22  R0.g5a........."
#     0010: 67 DC 27 14 B4 E3 35 DE   C6 43 2A 18 CF CE 4D 6C  g.'...5..C*...Ml
#     0020: E1 22 63 73 60 7F BD 1F   F5 0D 15 1E FC 79 59 23  ."cs`........yY#
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:01.029 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 13:07:01.030 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 13:07:01.030 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 13:07:01.030 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 13:07:01.030 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 13:07:01.030 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 13:07:01.030 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:01.030 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:01.032 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 9E 7E 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 13:06:45.000 UTC",
#       "not  after"         : "2024-01-14 13:06:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 75 89 E3 F7 3E E5 01   90 56 6D 38 0F 60 BE 83  Yu...>...Vm8.`..
#           0010: 82 A8 DF A4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 16 A8 C6 45 E3 99 1D BB   19 F9 A1 D7 B8 48 D5 F5  ...E.........H..
#           0010: E9 E9 9E 6F                                        ...o
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F 82 EC 90",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 13:06:39.000 UTC",
#       "not  after"         : "2024-01-14 13:06:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 C9 47 23 ED 0C 66 D4   93 08 B5 AF 56 6C F5 F6  ..G#..f.....Vl..
#           0010: D1 26 53 79                                        .&Sy
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 75 89 E3 F7 3E E5 01   90 56 6D 38 0F 60 BE 83  Yu...>...Vm8.`..
#           0010: 82 A8 DF A4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:01.056 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1A 32 8F 3E 13 20 60 D4   40 5B 80 F0 D5 01 FF EB  .2.>. `.@[......
#     0010: 68 20 2B 41 0B 42 82 1B   37 37 4B 7C 25 25 D6 B9  h +A.B..77K.%%..
#     0020: BD 2E 66 1C CC 67 1A 77   0E 11 80 21 FD 0D DF 04  ..f..g.w...!....
#     0030: 9A 93 C1 D8 94 B1 7D 73   D8 12 ED 96 82 09 44 CB  .......s......D.
#     0040: 0B EB EB 80 5E AD 7D 03   24 A7 FC 71 FA 31 97 9D  ....^...$..q.1..
#     0050: 72 80 E1 8C CE 16 FA 52   9E 09 03 C6 88 A5 E8 F2  r......R........
#     0060: 45 51 CC 1E AA 62 DA C1   E7 1D A8 62 3E 45 5A 88  EQ...b.....b>EZ.
#     0070: 4C 38 C3 48 CC 07 1B 75   9F 0E 8C 67 4E AF C4 56  L8.H...u...gN..V
#     0080: 1F F0 65 EC 0A 51 60 BF   6D A4 5B 33 1F C0 5F A9  ..e..Q`.m.[3.._.
#     0090: 59 71 5F 5A 82 3D 2E 12   94 E4 26 83 F5 8C 8B 8A  Yq_Z.=....&.....
#     00A0: 6F FC C3 3F 81 B1 96 60   0F 70 D0 3F AD B1 94 F0  o..?...`.p.?....
#     00B0: 93 51 D1 46 2B DB F7 D0   FD CC 68 F9 99 98 EF 75  .Q.F+.....h....u
#     00C0: 02 2D 6E 9C 1E FE 8D 45   F1 A3 4E 01 BE 79 1F 94  .-n....E..N..y..
#     00D0: AD B9 E9 9D 86 64 15 39   9E E2 26 F9 63 4F 7C 3B  .....d.9..&.cO.;
#     00E0: 8B E0 6F FA D5 96 A1 CE   DB 7F B2 06 03 F0 D6 88  ..o.............
#     00F0: 54 7E 3B F0 D4 16 44 5C   CC 0B 01 D2 86 41 6E 87  T.;...D\.....An.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:01.057 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F7 EF 1C A9 38 E1 7F 74   AD 0C 41 78 31 0C 75 BA  ....8..t..Ax1.u.
#     0010: 74 85 FD EC 47 0F 60 BF   16 CB 11 4A 19 E8 61 4C  t...G.`....J..aL
#     0020: 29 B9 7D FE 38 E0 74 EF   30 1B 54 0A 9A 86 4E 7F  )...8.t.0.T...N.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:01.058 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 13:07:01.130 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 13:07:01.130 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 13:07:01.130 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 13:07:01.130 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 13:07:01.138 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "42 1E AC DE 9A D4 DF 47 EB 18 61 99 2D 1C 85 EC D7 9D 4E E8 F7 1A 21 6D FA BC 8F CE D4 14 6B 4F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 13:07:01.756 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 13:07:01.757 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 13:07:04.263; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 13:07:04.268; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 13:07:04.640; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-8msZYN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8msZYN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 13:07:04.642; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-8msZYN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8msZYN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 13:07:04.643; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-8msZYN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8msZYN/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 13:07:04.684 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 9E 7E 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 13:06:45.000 UTC",
#     "not  after" 

[...truncated too long message...]


#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 3E AF 37 DC FF 6B 41   2C 1A 2F 0C D1 B8 C6 8D  .>.7..kA,./.....
#         0010: 0B 3C 29 C1                                        .<).
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 13:07:45.992 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 6A B1 0F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 13:07:15.000 UTC",
#     "not  after"         : "2024-01-14 13:07:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 7B 94 5C EA 68 FB 61   7F 5E A2 16 89 39 F7 26  u..\.h.a.^...9.&
#         0010: 47 8A C5 F2                                        G...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 C8 0A 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 13:07:17.000 UTC",
#     "not  after"         : "2024-01-14 13:07:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 7B 94 5C EA 68 FB 61   7F 5E A2 16 89 39 F7 26  u..\.h.a.^...9.&
#         0010: 47 8A C5 F2                                        G...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 51 D8 1C 33 81 2C E4   DC 57 94 D8 78 72 06 51  %Q..3.,..W..xr.Q
#         0010: CC 32 75 10                                        .2u.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 13:07:46.005 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14631ms
ok 65 stop command for single port in 16718ms
not ok 66 status detects locally running solr in 2657ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4383 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 260ms
ok 68 listing out files in 3894ms
ok 69 copying files around in 8696ms
ok 70 upconfig in 5040ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1236ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1239ms
not ok 73 Cleanup in 3610ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4383 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 3s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/kgucf7ce3zjea

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 836 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/836/

2 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.TestHdfsCloudBackupRestore.classMethod

Error Message:
java.lang.AssertionError: ObjectTracker found 7 object(s) that were not released!!! [InternalHttpClient, InternalHttpClient, MMapDirectory, MMapDirectory, SolrCore, MMapDirectory, MMapDirectory]
org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.inform(ReplicationHandler.java:1276)
	at org.apache.solr.cloud.ReplicateFromLeader.startReplication(ReplicateFromLeader.java:142)
	at org.apache.solr.cloud.ZkController.startReplicationFromLeader(ZkController.java:1445)
	at org.apache.solr.cloud.RecoveryStrategy.doReplicateOnlyRecovery(RecoveryStrategy.java:416)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:337)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.doFetch(ReplicationHandler.java:464)
	at org.apache.solr.cloud.RecoveryStrategy.replicate(RecoveryStrategy.java:247)
	at org.apache.solr.cloud.RecoveryStrategy.doReplicateOnlyRecovery(RecoveryStrategy.java:396)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:337)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.handler.IndexFetcher.fetchLatestIndex(IndexFetcher.java:615)
	at org.apache.solr.handler.IndexFetcher.fetchLatestIndex(IndexFetcher.java:425)
	at org.apache.solr.handler.ReplicationHandler.doFetch(ReplicationHandler.java:468)
	at org.apache.solr.handler.ReplicationHandler.lambda$setupPolling$13(ReplicationHandler.java:1241)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.runAndReset(FutureTask.java:305)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:305)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.getNewIndexDir(SolrCore.java:420)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:865)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.solr.core.SolrCore:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.core.SolrCore
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1237)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.update.SolrIndexWriter.create(SolrIndexWriter.java:108)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:904)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.initSnapshotMetaDataManager(SolrCore.java:615)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1129)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

 expected null, but was:<ObjectTracker found 7 object(s) that were not released!!! [InternalHttpClient, InternalHttpClient, MMapDirectory, MMapDirectory, SolrCore, MMapDirectory, MMapDirectory]
org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.inform(ReplicationHandler.java:1276)
	at org.apache.solr.cloud.ReplicateFromLeader.startReplication(ReplicateFromLeader.java:142)
	at org.apache.solr.cloud.ZkController.startReplicationFromLeader(ZkController.java:1445)
	at org.apache.solr.cloud.RecoveryStrategy.doReplicateOnlyRecovery(RecoveryStrategy.java:416)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:337)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.doFetch(ReplicationHandler.java:464)
	at org.apache.solr.cloud.RecoveryStrategy.replicate(RecoveryStrategy.java:247)
	at org.apache.solr.cloud.RecoveryStrategy.doReplicateOnlyRecovery(RecoveryStrategy.java:396)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:337)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.handler.IndexFetcher.fetchLatestIndex(IndexFetcher.java:615)
	at org.apache.solr.handler.IndexFetcher.fetchLatestIndex(IndexFetcher.java:425)
	at org.apache.solr.handler.ReplicationHandler.doFetch(ReplicationHandler.java:468)
	at org.apache.solr.handler.ReplicationHandler.lambda$setupPolling$13(ReplicationHandler.java:1241)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.runAndReset(FutureTask.java:305)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:305)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.getNewIndexDir(SolrCore.java:420)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:865)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.solr.core.SolrCore:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.core.SolrCore
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1237)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.update.SolrIndexWriter.create(SolrIndexWriter.java:108)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:904)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.initSnapshotMetaDataManager(SolrCore.java:615)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1129)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

>

Stack Trace:
java.lang.AssertionError: ObjectTracker found 7 object(s) that were not released!!! [InternalHttpClient, InternalHttpClient, MMapDirectory, MMapDirectory, SolrCore, MMapDirectory, MMapDirectory]
org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.inform(ReplicationHandler.java:1276)
	at org.apache.solr.cloud.ReplicateFromLeader.startReplication(ReplicateFromLeader.java:142)
	at org.apache.solr.cloud.ZkController.startReplicationFromLeader(ZkController.java:1445)
	at org.apache.solr.cloud.RecoveryStrategy.doReplicateOnlyRecovery(RecoveryStrategy.java:416)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:337)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.doFetch(ReplicationHandler.java:464)
	at org.apache.solr.cloud.RecoveryStrategy.replicate(RecoveryStrategy.java:247)
	at org.apache.solr.cloud.RecoveryStrategy.doReplicateOnlyRecovery(RecoveryStrategy.java:396)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:337)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.handler.IndexFetcher.fetchLatestIndex(IndexFetcher.java:615)
	at org.apache.solr.handler.IndexFetcher.fetchLatestIndex(IndexFetcher.java:425)
	at org.apache.solr.handler.ReplicationHandler.doFetch(ReplicationHandler.java:468)
	at org.apache.solr.handler.ReplicationHandler.lambda$setupPolling$13(ReplicationHandler.java:1241)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.runAndReset(FutureTask.java:305)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:305)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.getNewIndexDir(SolrCore.java:420)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:865)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.solr.core.SolrCore:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.core.SolrCore
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1237)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.update.SolrIndexWriter.create(SolrIndexWriter.java:108)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:904)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.initSnapshotMetaDataManager(SolrCore.java:615)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1129)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

 expected null, but was:<ObjectTracker found 7 object(s) that were not released!!! [InternalHttpClient, InternalHttpClient, MMapDirectory, MMapDirectory, SolrCore, MMapDirectory, MMapDirectory]
org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.inform(ReplicationHandler.java:1276)
	at org.apache.solr.cloud.ReplicateFromLeader.startReplication(ReplicateFromLeader.java:142)
	at org.apache.solr.cloud.ZkController.startReplicationFromLeader(ZkController.java:1445)
	at org.apache.solr.cloud.RecoveryStrategy.doReplicateOnlyRecovery(RecoveryStrategy.java:416)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:337)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.doFetch(ReplicationHandler.java:464)
	at org.apache.solr.cloud.RecoveryStrategy.replicate(RecoveryStrategy.java:247)
	at org.apache.solr.cloud.RecoveryStrategy.doReplicateOnlyRecovery(RecoveryStrategy.java:396)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:337)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.handler.IndexFetcher.fetchLatestIndex(IndexFetcher.java:615)
	at org.apache.solr.handler.IndexFetcher.fetchLatestIndex(IndexFetcher.java:425)
	at org.apache.solr.handler.ReplicationHandler.doFetch(ReplicationHandler.java:468)
	at org.apache.solr.handler.ReplicationHandler.lambda$setupPolling$13(ReplicationHandler.java:1241)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.runAndReset(FutureTask.java:305)
	at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:305)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.getNewIndexDir(SolrCore.java:420)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:865)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.solr.core.SolrCore:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.core.SolrCore
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1237)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.update.SolrIndexWriter.create(SolrIndexWriter.java:108)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:904)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.lucene.store.MMapDirectory:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.store.MMapDirectory
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.initSnapshotMetaDataManager(SolrCore.java:615)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1129)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1705)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1571)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:114)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:414)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:231)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Ch

[...truncated too long message...]

alse
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 84 97 3A 05 BE 3C 77   08 A2 B0 75 6F 1C 4A F8  ...:..<w...uo.J.
#         0010: 09 5F BA C9                                        ._..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C A8 26 8E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 10:28:07.000 UTC",
#     "not  after"         : "2024-01-14 10:28:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 84 97 3A 05 BE 3C 77   08 A2 B0 75 6F 1C 4A F8  ...:..<w...uo.J.
#         0010: 09 5F BA C9                                        ._..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 27 A7 BA 85 B0 46 A8 A1   14 9F 94 86 C0 CA 0A E2  '....F..........
#         0010: EB 47 29 98                                        .G).
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 10:28:36.807 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14680ms
ok 65 stop command for single port in 17130ms
not ok 66 status detects locally running solr in 2567ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4383 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 239ms
ok 68 listing out files in 2877ms
ok 69 copying files around in 13003ms
ok 70 upconfig in 6095ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1229ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1227ms
not ok 73 Cleanup in 3492ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 26225 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4383 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 26225 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.TestHdfsCloudBackupRestore.classMethod (:solr:modules:hdfs)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.TestHdfsCloudBackupRestore.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.TestHdfsCloudBackupRestore.classMethod" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=F783AA9E1017409D -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8

  - org.apache.solr.hdfs.cloud.api.collections.TestHdfsCloudBackupRestore.classMethod (:solr:modules:hdfs)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.TestHdfsCloudBackupRestore.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.TestHdfsCloudBackupRestore.classMethod" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=F783AA9E1017409D -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 5m 52s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/tfkbmsavr4xsc

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 835 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/835/

1 tests failed.
FAILED:  org.apache.solr.search.TestCoordinatorRole.testNRTRestart

Error Message:
java.lang.AssertionError: Docs should not be null. Query response was: {error={metadata={error-class=org.apache.solr.client.solrj.impl.BaseHttpSolrClient$RemoteSolrException, root-error-class=java.nio.channels.AsynchronousCloseException}, msg=Error from server at https://127.0.0.1:44375/solr/coordinator_test_coll_shard1_replica_n1/select: parsing error, code=200}}

Stack Trace:
java.lang.AssertionError: Docs should not be null. Query response was: {error={metadata={error-class=org.apache.solr.client.solrj.impl.BaseHttpSolrClient$RemoteSolrException, root-error-class=java.nio.channels.AsynchronousCloseException}, msg=Error from server at https://127.0.0.1:44375/solr/coordinator_test_coll_shard1_replica_n1/select: parsing error, code=200}}
	at __randomizedtesting.SeedInfo.seed([9ADC94972085502E:6A48245C829882F8]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.assertTrue(Assert.java:42)
	at org.junit.Assert.assertNotNull(Assert.java:713)
	at org.apache.solr.search.TestCoordinatorRole.getHostCoreName(TestCoordinatorRole.java:467)
	at org.apache.solr.search.TestCoordinatorRole.testNRTRestart(TestCoordinatorRole.java:282)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 9347 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196107ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 4726ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-16 07:44:22.495; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:44:23.674; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 4534ms
not ok 8 accept d option with builtin config in 2246ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-16 07:44:30.460; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:44:30.511; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 5658ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-16 07:44:32.794; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:44:36.150; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 3367ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-16 07:44:38.404; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:44:39.571; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 3293ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-16 07:44:41.708; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:44:42.867; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 4365ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-16 07:44:45.032; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:44:47.290; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 3284ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-16 07:44:49.448; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:44:50.599; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 5211ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-16 07:44:58.727; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:45:00.998; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2138ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-16 07:45:03.122; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:45:03.171; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 5442ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-16 07:45:05.282; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:45:08.644; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 5505ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-16 07:45:10.789; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:45:14.142; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 22393ms
ok 19 Check export command in 21288ms
ok 20 export fails on non cloud mode in 8763ms
not ok 21 using curl to extract a single pdf file in 10768ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 32959 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32959 (pid=30392). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-16 07:46:15.374; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:46:17.638; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8025ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 32959 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32959 (pid=30855). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-16 07:46:25.657; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:46:25.716; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 12972ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 32959 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32959 (pid=31279). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-16 07:46:34.257; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:46:38.711; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 29584ms
ok 25 start help flag prints help in 165ms
ok 26 stop help flag prints help in 267ms
ok 27 restart help flag prints help in 236ms
ok 28 status help flag prints help in 53ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 157ms
ok 30 create help flag prints help in 157ms
ok 31 createcore help flag prints help in 172ms
ok 32 createcollection help flag prints help in 158ms
ok 33 delete help flag prints help in 174ms
ok 34 version help flag prints help in 51ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 238ms
ok 36 auth help flag prints help in 245ms
ok 37 assert help flag prints help in 984ms
ok 38 post help flag prints help in 1056ms
ok 39 SQL Module in 18341ms
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 24845ms
not ok 41 icu collation in analysis-extras module in 10435ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-16 07:48:05.336; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:48:06.489; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1339ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 4383 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 12958ms
ok 44 deploying and undeploying a collection level package in 18412ms
ok 45 Affinity placement plugin using sysprop in 16141ms
ok 46 Random placement plugin using ENV in 17141ms
ok 47 Check help command in 4065ms
ok 48 basic post with a type specified in 5434ms
ok 49 basic post WITHOUT a type specified in 11744ms
ok 50 crawling a directory in 4349ms
ok 51 crawling a web site in 4604ms
ok 52 commit and optimize and delete in 3867ms
ok 53 args mode in 6225ms
ok 54 stdin mode in 3412ms
not ok 55 post solr log into solr via script in 4897ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-16 07:50:10.753; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:50:11.907; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 3334ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-16 07:50:14.149; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:50:15.306; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 9754ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:32959/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-tiQIok%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-16 07:50:25.110; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 07:50:25.163; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:32959/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-tiQIok%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12838ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 32959 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32959 (pid=12364). Happy searching!
#
#     INFO  - 2023-10-16 07:50:32.433; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 07:50:32.437; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 07:50:32.943; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-tiQIok/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-tiQIok/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 07:50:36.335; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 07:50:36.339; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-16 07:50:37.779; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 07:50:37.784; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12699ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 32959 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32959 (pid=13032). Happy searching!
#
#     INFO  - 2023-10-16 07:50:45.169; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 07:50:45.174; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 07:50:45.691; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-tiQIok/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-tiQIok/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 07:50:46.110; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-tiQIok/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-tiQIok/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 07:50:46.110; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-tiQIok/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-tiQIok/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 07:50:48.868; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 07:50:48.872; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-16 07:50:49.275; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@1b11ef33[provider=null,keyStore=file:///tmp/bats-run-tiQIok/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-tiQIok/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-16 07:50:49.276; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@1b11ef33[provider=null,keyStore=file:///tmp/bats-run-tiQIok/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-tiQIok/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-16 07:50:50.335; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 07:50:50.356; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-16 07:50:50.943; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-tiQIok/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-tiQIok/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 07:50:50.944; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-tiQIok/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-tiQIok/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10453ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 32959 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32959 (pid=13682). Happy searching!
#
#     INFO  - 2023-10-16 07:50:57.854; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 07:50:57.870; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-16 07:51:00.986; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 07:51:00.990; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13746ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-16 07:51:09.423; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 07:51:13.201; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-16 07:51:14.521; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 37033ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-tiQIok/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 32959 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32959 (pid=15258). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 32960 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32960 (pid=15417). Happy searching!
#
#     INFO  - 2023-10-16 07:51:38.925; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 07:51:38.929; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 07:51:39.294; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-tiQIok/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tiQIok/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 07:51:39.296; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-tiQIok/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tiQIok/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 07:51:39.297; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-tiQIok/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tiQIok/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 07:51:39.334 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 24 AE 99",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 07:51:26.000 UTC",
#     "not  after"         : "2024-01-14 07:51:26.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 D6 54 1E 52 E9 DB FA   64 69 8A 98 86 CB B9 44  a.T.R...di.....D
#         0010: D6 BA 6C B7                                        ..l.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA B4 30 2F 4C 44 F2 59   98 9C 57 6B 12 12 B4 FA  ..0/LD.Y..Wk....
#         0010: 83 B7 FE AA                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 38 B9 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 07:51:20.000 UTC",
#     "not  after"         : "2024-01-14 07:51:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C 15 DE 3E 52 48 00 2E   06 80 78 84 F9 9A C6 C0  ...>RH....x.....
#         0010: 42 12 B1 4B                                        B..K
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 D6 54 1E 52 E9 DB FA   64 69 8A 98 86 CB B9 44  a.T.R...di.....D
#         0010: D6 BA 6C B7                                        ..l.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 07:51:39.338 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 80 33 D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 07:51:18.000 UTC",
#     "not  after"         : "2024-01-14 07:51:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C 15 DE 3E 52 48 00 2E   06 80 78 84 F9 9A C6 C0  ...>RH....x.....
#         0010: 42 12 B1 4B                                        B..K
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 38 B9 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 07:51:20.000 UTC",
#     "not  after"         : "2024-01-14 07:51:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C 15 DE 3E 52 48 00 2E   06 80 78 84 F9 9A C6 C0  ...>RH....x.....
#         0010: 42 12 B1 4B                                        B..K
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 D6 54 1E 52 E9 DB FA   64 69 8A 98 86 CB B9 44  a.T.R...di.....D
#         0010: D6 BA 6C B7                                        ..l.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 07:51:39.348 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 07:51:39.502 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 07:51:39.502 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 07:51:39.504 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 07:51:39.504 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 07:51:39.508 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 07:51:39.518 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 07:51:39.518 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 07:51:39.518 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 07:51:39.520 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C6 00 53 8B E7 2D 61 D9 C8 43 04 14 B3 E7 BD 20 ED 86 43 B6 8F 3A B4 99 E8 83 D0 C8 E8 64 7A 88",
#   "session id"          : "3B BB FA 3B C5 52 77 4A 4F 80 0F CD A3 66 2B 16 20 53 04 55 BB B5 23 8A 60 E9 E3 FB FE 0B DA 99",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B7 D8 24 C8 D1 72 2D A2   05 61 69 8B 39 EA D8 95  ..$..r-..ai.9...
#             0010: 4D 36 A4 25 3E 27 76 27   C1 24 10 4B CC 87 30 23  M6.%>'v'.$.K..0#
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.636 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "38 3A 6E A7 D3 5B 2F 97 A9 E1 69 D8 8C F6 D3 8D 1B 1A 5E FD 37 2F F8 B8 15 6D A7 37 4E 42 03 CF",
#   "session id"          : "3B BB FA 3B C5 52 77 4A 4F 80 0F CD A3 66 2B 16 20 53 04 55 BB B5 23 8A 60 E9 E3 FB FE 0B DA 99",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 85 59 4C 27 3E 56 69 B9   84 2D 5D 20 88 A1 93 AB  .YL'>Vi..-] ....
#           0010: B5 8D DA C4 42 E9 68 1B   5B A7 00 D3 B3 87 D7 5C  ....B.h.[......\
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.636 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.636 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.894 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.894 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.895 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.895 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.895 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.895 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.895 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.895 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.897 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.897 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.898 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.898 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.898 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.898 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.898 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.898 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.901 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 07:51:39.902 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 07:51:39.903 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.903 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.903 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.913 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.928 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.929 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.943 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.943 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.943 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.944 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.944 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 07:51:39.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 07:51:39.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.948 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.948 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.948 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.950 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.951 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.952 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 07:51:39.952 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.960 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "23 0D DA 12",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 07:51:22.000 UTC",
#       "not  after"         : "2024-01-14 07:51:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 61 D6 54 1E 52 E9 DB FA   64 69 8A 98 86 CB B9 44  a.T.R...di.....D
#           0010: D6 BA 6C B7                                        ..l.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A4 FB 28 23 15 8A 01 74   17 93 B0 EB 16 B9 6F A1  ..(#...t......o.
#           0010: DB D2 34 C9                                        ..4.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:39.961 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:40.024 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 38 B9 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 07:51:20.000 UTC",
#     "not  after"         : "2024-01-14 07:51:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C 15 DE 3E 52 48 00 2E   06 80 78 84 F9 9A C6 C0  ...>RH....x.....
#         0010: 42 12 B1 4B                                        B..K
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 D6 54 1E 52 E9 DB FA   64 69 8A 98 86 CB B9 44  a.T.R...di.....D
#         0010: D6 BA 6C B7                                        ..l.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:40.027 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 46 71 4A C8 58 F3 15 16   82 33 7A 00 77 78 FD 59  FqJ.X....3z.wx.Y
#     0010: A7 51 92 A6 0A 77 B9 91   C8 8E 18 2B 79 43 0D 42  .Q...w.....+yC.B
#     0020: B2 BD CE 84 EE 18 AB 6B   B2 F7 EE EC 52 46 54 74  .......k....RFTt
#     0030: 80 F8 EA 94 78 AB 62 7A   B9 61 49 2A 4A CB CA D7  ....x.bz.aI*J...
#     0040: FC F4 74 B0 2D D3 F3 BE   74 4F 9E E3 29 A4 49 DE  ..t.-...tO..).I.
#     0050: A2 94 8B FC 8A A1 55 F5   DC A4 F8 D7 C3 DA C1 FD  ......U.........
#     0060: 8B 8E 82 2E F7 EF 41 FB   97 A9 EF 94 AA A3 4F BB  ......A.......O.
#     0070: 7E BA A4 77 56 91 49 77   94 3E 9E 08 47 8F 06 85  ...wV.Iw.>..G...
#     0080: 19 DD 9A 42 3C 47 40 9C   60 E1 8A C3 54 97 1E 7E  ...B<G@.`...T...
#     0090: B1 12 18 50 FD B1 BB 1E   6C 76 9D D6 AA FC D1 B2  ...P....lv......
#     00A0: CC 92 7D 55 21 3E 42 0E   B7 74 3F A3 9E A2 8B A3  ...U!>B..t?.....
#     00B0: C8 59 BE 07 83 7C BD 7E   49 DE D0 C6 AC DE 3D 91  .Y......I.....=.
#     00C0: B2 98 13 3C 8E 2A 62 49   DC AD 72 B3 5C 7F 54 72  ...<.*bI..r.\.Tr
#     00D0: C0 52 FA E3 49 56 4E AA   DE 28 26 46 86 90 16 7D  .R..IVN..(&F....
#     00E0: 38 43 15 8A 28 2C 7C 03   D9 60 FD 20 FD 36 0D 18  8C..(,...`. .6..
#     00F0: 8D 12 F8 EE 2F 95 24 24   3C EE AA 10 C3 EB 6D 6E  ..../.$$<.....mn
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:40.029 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DD 1D AA 78 1C F7 7C A1   7F C0 1A B1 A3 66 27 85  ...x.........f'.
#     0010: C9 96 75 FF 35 B8 D0 B6   1D 07 66 53 CB AB 05 EF  ..u.5.....fS....
#     0020: 7F E6 33 C8 BD F3 37 9A   AD 18 35 EC F7 5C BE BD  ..3...7...5..\..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:40.030 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 07:51:40.031 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 07:51:40.031 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 07:51:40.031 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 07:51:40.031 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 07:51:40.031 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 07:51:40.032 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:40.032 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 07:51:40.034 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 24 AE 99",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 07:51:26.000 UTC",
#       "not  after"         : "2024-01-14 07:51:26.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 61 D6 54 1E 52 E9 DB FA   64 69 8A 98 86 CB B9 44  a.T.R...di.....D
#           0010: D6 BA 6C B7                                        ..l.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BA B4 30 2F 4C 44 F2 59   98 9C 57 6B 12 12 B4 FA  ..0/LD.Y..Wk....
#           0010: 83 B7 FE AA                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F 38 B9 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 07:51:20.000 UTC",
#       "not  after"         : "2024-01-14 07:51:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C 15 DE 3E 52 48 00 2E   06 80 78 84 F9 9A C6 C0  ...>RH....x.....
#           0010: 42 12 B1 4B                                        B..K
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#       

[...truncated too long message...]

..R
#         0010: 2F 5E 6F D8                                        /^o.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 07:52:26.236 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4A F5 16 DD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 07:51:55.000 UTC",
#     "not  after"         : "2024-01-14 07:51:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 82 06 CD 53 55 BC 55   B6 55 AC 4C CD C5 02 6F   ...SU.U.U.L...o
#         0010: 73 55 AB 9F                                        sU..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 76 C1 BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 07:51:57.000 UTC",
#     "not  after"         : "2024-01-14 07:51:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 82 06 CD 53 55 BC 55   B6 55 AC 4C CD C5 02 6F   ...SU.U.U.L...o
#         0010: 73 55 AB 9F                                        sU..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA A3 B4 45 5A B9 0D 8E   E5 5A A7 DF 49 F4 C6 D7  ...EZ....Z..I...
#         0010: D3 5E D2 48                                        .^.H
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 07:52:26.247 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14435ms
ok 65 stop command for single port in 16810ms
not ok 66 status detects locally running solr in 1409ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 4383 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 218ms
ok 68 listing out files in 2639ms
ok 69 copying files around in 8397ms
ok 70 upconfig in 2693ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1217ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1215ms
not ok 73 Cleanup in 2431ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 4383 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 4383 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.search.TestCoordinatorRole.testNRTRestart (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.search.TestCoordinatorRole.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.search.TestCoordinatorRole.testNRTRestart" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=9ADC94972085502E -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 27s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/dbw6t3dc3l6eg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 834 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/834/

All tests passed

Build Log:
[...truncated 1164 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196534ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3431ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-16 03:04:31.657; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:04:31.713; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1214ms
not ok 8 accept d option with builtin config in 2357ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-16 03:04:35.279; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:04:35.331; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2437ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-16 03:04:37.725; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:04:37.782; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2384ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-16 03:04:40.143; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:04:40.197; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2357ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-16 03:04:42.527; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:04:42.577; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2299ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-16 03:04:44.830; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:04:44.894; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2339ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-16 03:04:47.199; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:04:47.252; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3361ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-16 03:04:55.832; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:04:55.884; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2272ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-16 03:04:58.124; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:04:58.178; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2325ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-16 03:05:00.472; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:05:00.533; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2422ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-16 03:05:02.905; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:05:02.967; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 23930ms
ok 19 Check export command in 22167ms
ok 20 export fails on non cloud mode in 8674ms
not ok 21 using curl to extract a single pdf file in 9041ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 41555 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41555 (pid=4014934). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-16 03:06:06.982; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:06:07.042; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8727ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 41555 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41555 (pid=4015402). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-16 03:06:15.772; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:06:15.827; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 9020ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 41555 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41555 (pid=4015823). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-16 03:06:24.812; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:06:24.866; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30608ms
ok 25 start help flag prints help in 173ms
ok 26 stop help flag prints help in 158ms
ok 27 restart help flag prints help in 162ms
ok 28 status help flag prints help in 47ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 157ms
ok 30 create help flag prints help in 164ms
ok 31 createcore help flag prints help in 161ms
ok 32 createcollection help flag prints help in 184ms
ok 33 delete help flag prints help in 179ms
ok 34 version help flag prints help in 47ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 160ms
ok 36 auth help flag prints help in 168ms
ok 37 assert help flag prints help in 907ms
ok 38 post help flag prints help in 964ms
not ok 39 SQL Module in 10487ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:41555/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-16 03:07:09.969; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:07:10.030; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:41555/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19047ms
not ok 41 icu collation in analysis-extras module in 8613ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-16 03:07:37.682; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:07:37.756; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1335ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 598378 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10007ms
not ok 44 deploying and undeploying a collection level package in 196871ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 41555 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41555 (pid=4019961). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 11324ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-16 03:11:16.376; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:11:16.433; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-16 03:11:17.430; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:11:17.484; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 11597ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-16 03:11:27.931; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:11:27.985; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-16 03:11:29.030; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:11:29.093; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3708ms
not ok 48 basic post with a type specified in 1314ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1265ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1230ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1235ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1356ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1291ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1304ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 3710ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-16 03:11:56.155; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:11:56.222; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2399ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-16 03:11:58.597; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:11:58.650; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10517ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:41555/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-Ao8cDh%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-16 03:12:09.231; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 03:12:09.283; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:41555/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-Ao8cDh%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12975ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 41555 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41555 (pid=4026407). Happy searching!
#
#     INFO  - 2023-10-16 03:12:16.553; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 03:12:16.559; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 03:12:17.069; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-Ao8cDh/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ao8cDh/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 03:12:20.461; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 03:12:20.466; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-16 03:12:22.012; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 03:12:22.016; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13321ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 41555 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41555 (pid=4027003). Happy searching!
#
#     INFO  - 2023-10-16 03:12:29.734; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 03:12:29.739; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 03:12:30.294; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-Ao8cDh/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ao8cDh/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 03:12:30.399; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-Ao8cDh/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ao8cDh/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 03:12:30.400; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-Ao8cDh/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ao8cDh/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 03:12:33.791; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 03:12:33.795; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-16 03:12:34.204; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-Ao8cDh/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ao8cDh/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-16 03:12:34.206; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-Ao8cDh/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ao8cDh/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-16 03:12:35.324; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 03:12:35.329; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-16 03:12:35.748; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@2f2bf0e2[provider=null,keyStore=file:///tmp/bats-run-Ao8cDh/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ao8cDh/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 03:12:35.749; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@2f2bf0e2[provider=null,keyStore=file:///tmp/bats-run-Ao8cDh/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Ao8cDh/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10825ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 41555 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41555 (pid=4027613). Happy searching!
#
#     INFO  - 2023-10-16 03:12:43.192; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 03:12:43.202; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-16 03:12:45.608; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 03:12:45.614; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13478ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-16 03:12:54.767; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 03:12:58.346; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-16 03:12:59.822; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 37498ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-Ao8cDh/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41555 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41555 (pid=4029239). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41556 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 41556 (pid=4029350). Happy searching!
#
#     INFO  - 2023-10-16 03:13:25.674; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 03:13:25.689; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 03:13:26.674; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-Ao8cDh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Ao8cDh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 03:13:26.677; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-Ao8cDh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Ao8cDh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 03:13:26.678; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(ca,h=[localhost],a=[],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-Ao8cDh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Ao8cDh/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 03:13:26.724 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C F2 2A 49",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 03:13:11.000 UTC",
#     "not  after"         : "2024-01-14 03:13:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E A7 6D F9 A1 0E F4 1B   35 02 F9 48 C5 E5 6C 21  N.m.....5..H..l!
#         0010: 9F 04 96 38                                        ...8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 3E AD 05 FE 14 75 45   59 F5 8E 2B 90 73 95 55  .>....uEY..+.s.U
#         0010: 3A 70 1A FF                                        :p..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "05 3A 88 FE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 03:13:05.000 UTC",
#     "not  after"         : "2024-01-14 03:13:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 9F 29 D6 29 22 E8 CE   11 0A D8 07 DC 5E 3B B4  w.).)".......^;.
#         0010: 42 46 AB BF                                        BF..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E A7 6D F9 A1 0E F4 1B   35 02 F9 48 C5 E5 6C 21  N.m.....5..H..l!
#         0010: 9F 04 96 38                                        ...8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 03:13:26.729 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "05 3A 88 FE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 03:13:05.000 UTC",
#     "not  after"         : "2024-01-14 03:13:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 9F 29 D6 29 22 E8 CE   11 0A D8 07 DC 5E 3B B4  w.).)".......^;.
#         0010: 42 46 AB BF                                        BF..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E A7 6D F9 A1 0E F4 1B   35 02 F9 48 C5 E5 6C 21  N.m.....5..H..l!
#         0010: 9F 04 96 38                                        ...8
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 B0 2E E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 03:13:03.000 UTC",
#     "not  after"         : "2024-01-14 03:13:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 9F 29 D6 29 22 E8 CE   11 0A D8 07 DC 5E 3B B4  w.).)".......^;.
#         0010: 42 46 AB BF                                        BF..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 03:13:26.751 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 03:13:27.031 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 03:13:27.031 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 03:13:27.038 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 03:13:27.038 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 03:13:27.042 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 03:13:27.058 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 03:13:27.059 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 03:13:27.059 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 03:13:27.065 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "CE D3 27 D7 F8 75 04 50 6B 25 BC 99 F4 92 15 CC 38 22 27 BC 98 3F 58 7E C8 AA 2B F1 89 87 DC 60",
#   "session id"          : "88 C9 9A ED 2E 3D AA 7B 62 E0 B0 DC 11 07 AF 3B F7 91 14 14 2C E4 0D 21 70 6D E1 F9 65 F5 2D 07",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7D 07 49 82 18 E5 35 F9   9F 2A 49 BE 88 98 47 F1  ..I...5..*I...G.
#             0010: E6 82 1A C1 54 80 F3 A4   7B 78 1E 86 F1 05 48 1D  ....T....x....H.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.245 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2B 67 A0 B3 80 07 50 9B 94 FF 58 18 60 09 46 E4 A1 90 C3 A7 FE 45 2B E6 1C 1C F9 B2 13 73 89 F2",
#   "session id"          : "88 C9 9A ED 2E 3D AA 7B 62 E0 B0 DC 11 07 AF 3B F7 91 14 14 2C E4 0D 21 70 6D E1 F9 65 F5 2D 07",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C0 DE 16 C5 CF 8F 67 15   F1 DC 47 25 19 C7 4B 1E  ......g...G%..K.
#           0010: 91 FD 19 F5 BA B0 74 97   DA 55 8A 10 12 0D F2 1B  ......t..U......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.245 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.245 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.249 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.249 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.249 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.249 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.249 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.250 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.250 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.250 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.252 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.252 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.756 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.756 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.757 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.757 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.760 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.760 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.760 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.760 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 03:13:27.760 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 03:13:27.760 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.760 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.783 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.787 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.808 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.820 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.820 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.820 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.821 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.821 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.821 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.823 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 03:13:27.823 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 03:13:27.823 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.824 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.824 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.824 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.825 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.825 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.826 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 03:13:27.826 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.832 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2D 83 A1 32",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 03:13:07.000 UTC",
#       "not  after"         : "2024-01-14 03:13:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E A7 6D F9 A1 0E F4 1B   35 02 F9 48 C5 E5 6C 21  N.m.....5..H..l!
#           0010: 9F 04 96 38                                        ...8
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A8 EC 0C CE 64 15 8B 44   EC F1 7A D4 92 C1 74 F5  ....d..D..z...t.
#           0010: 9A 87 04 B0                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.833 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.963 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "05 3A 88 FE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 03:13:05.000 UTC",
#     "not  after"         : "2024-01-14 03:13:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 9F 29 D6 29 22 E8 CE   11 0A D8 07 DC 5E 3B B4  w.).)".......^;.
#         0010: 42 46 AB BF                                        BF..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E A7 6D F9 A1 0E F4 1B   35 02 F9 48 C5 E5 6C 21  N.m.....5..H..l!
#         0010: 9F 04 96 38                                        ...8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.979 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0E 43 58 29 5F DD 2C 94   54 7D 36 0B 91 FA 61 FB  .CX)_.,.T.6...a.
#     0010: FE 8B 38 3A AE F9 E1 10   A9 C4 D3 B3 7D 59 50 BA  ..8:.........YP.
#     0020: 35 0F 1E 32 70 B1 FA 58   00 6E A4 FF 97 58 A4 AF  5..2p..X.n...X..
#     0030: D2 88 C3 D4 B0 3C 57 5F   13 5F 8A D0 7F 03 2A 29  .....<W_._....*)
#     0040: 68 B8 E4 0C 4E 0F 1E 99   5C 0A 5C 9C BA 72 4A 3C  h...N...\.\..rJ<
#     0050: 8A 7B 66 76 48 90 B9 C7   42 EE A9 81 38 42 62 7E  ..fvH...B...8Bb.
#     0060: 73 D7 95 4C F1 BF 92 88   38 DA 13 36 B1 AE 90 2A  s..L....8..6...*
#     0070: FF E9 2C 59 89 26 15 6F   6D F8 95 65 B3 11 66 B3  ..,Y.&.om..e..f.
#     0080: CA FD EA F6 9E C9 FE 29   0B B6 50 4C B5 53 03 00  .......)..PL.S..
#     0090: 7F EB 5F 66 9F 7F 39 41   F4 DC 1E A0 E3 61 5E D2  .._f..9A.....a^.
#     00A0: FD F6 DA 6C 42 60 BB 94   B2 E8 2C BE 11 8D 0C A1  ...lB`....,.....
#     00B0: 25 FA 88 A9 14 6F 13 BD   34 E1 1E AE 6F 34 A4 CF  %....o..4...o4..
#     00C0: 22 F9 02 C5 06 59 2C B2   C1 B4 F4 20 13 D8 D1 89  "....Y,.... ....
#     00D0: B2 78 E3 A9 BB B8 0B F3   FF FF C6 AA 78 C3 F3 8D  .x..........x...
#     00E0: B3 0A 09 5C 5D DA 46 74   1A C1 CF 4E 47 05 9D 0E  ...\].Ft...NG...
#     00F0: F5 A1 C4 3E AD 45 C2 A1   93 16 F5 A3 2B 62 D9 BB  ...>.E......+b..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.981 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 02 C0 A8 08 FC E8 2B BC   49 8A 6D 56 99 44 AC 36  ......+.I.mV.D.6
#     0010: 1C 67 F3 C0 50 DE F6 B3   58 EB D0 C5 56 A8 BE F0  .g..P...X...V...
#     0020: B3 FE 18 1A 53 41 63 87   55 4F C6 61 02 67 A7 15  ....SAc.UO.a.g..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 03:13:27.982 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 03:13:27.983 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-

[...truncated too long message...]


#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FD D6 A5 5A 6A AF 57 36   A3 4C E7 9E A8 51 92 B8  ...Zj.W6.L...Q..
#         0010: 1D 3D D9 97                                        .=..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE F8 A1 42 64 D4 F0 A8   1A 3E 49 79 68 6F 9C 1B  ...Bd....>Iyho..
#         0010: 2D B4 7A 6E                                        -.zn
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 03:14:11.097 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 60 C4 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 03:13:40.000 UTC",
#     "not  after"         : "2024-01-14 03:13:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A1 41 7C A1 5B 32 40 70   3F 53 DE AB 1C 0F 29 7F  .A..[2@p?S....).
#         0010: F0 C7 B5 04                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 B1 5C 83",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 03:13:42.000 UTC",
#     "not  after"         : "2024-01-14 03:13:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A1 41 7C A1 5B 32 40 70   3F 53 DE AB 1C 0F 29 7F  .A..[2@p?S....).
#         0010: F0 C7 B5 04                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FD D6 A5 5A 6A AF 57 36   A3 4C E7 9E A8 51 92 B8  ...Zj.W6.L...Q..
#         0010: 1D 3D D9 97                                        .=..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 03:14:11.108 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14784ms
ok 65 stop command for single port in 17390ms
not ok 66 status detects locally running solr in 2618ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 3310606 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 598378 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 3310606 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 256ms
ok 68 listing out files in 2887ms
ok 69 copying files around in 6641ms
ok 70 upconfig in 2698ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1235ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1238ms
not ok 73 Cleanup in 3633ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 3310606 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 598378 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 3310606 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 58s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/3undjhomra2ha

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 833 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/833/

All tests passed

Build Log:
[...truncated 1161 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196689ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 4167ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-15 23:52:39.775; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:52:39.852; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1361ms
not ok 8 accept d option with builtin config in 2806ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-15 23:52:43.979; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:52:44.058; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2718ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-15 23:52:46.735; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:52:46.818; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2840ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-15 23:52:49.582; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:52:49.661; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2770ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-15 23:52:52.411; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:52:52.481; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2426ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-15 23:52:54.897; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:52:54.945; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2291ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-15 23:52:57.206; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:52:57.259; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3335ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-15 23:53:05.818; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:53:05.874; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2269ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-15 23:53:08.129; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:53:08.181; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2314ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-15 23:53:10.456; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:53:10.510; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2283ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-15 23:53:12.757; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:53:12.813; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 24047ms
ok 19 Check export command in 21876ms
ok 20 export fails on non cloud mode in 9019ms
not ok 21 using curl to extract a single pdf file in 9203ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 35797 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35797 (pid=3758946). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-15 23:54:17.158; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:54:17.214; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8690ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 35797 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35797 (pid=3759365). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-15 23:54:25.869; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:54:25.924; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8548ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 35797 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35797 (pid=3759850). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-15 23:54:34.457; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:54:34.509; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30444ms
ok 25 start help flag prints help in 163ms
ok 26 stop help flag prints help in 161ms
ok 27 restart help flag prints help in 168ms
ok 28 status help flag prints help in 48ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 159ms
ok 30 create help flag prints help in 159ms
ok 31 createcore help flag prints help in 160ms
ok 32 createcollection help flag prints help in 162ms
ok 33 delete help flag prints help in 160ms
ok 34 version help flag prints help in 48ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 163ms
ok 36 auth help flag prints help in 161ms
ok 37 assert help flag prints help in 972ms
ok 38 post help flag prints help in 991ms
not ok 39 SQL Module in 10230ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:35797/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-15 23:55:19.231; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:55:19.287; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:35797/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19147ms
not ok 41 icu collation in analysis-extras module in 8482ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-15 23:55:46.941; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:55:46.997; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1314ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 598378 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9995ms
not ok 44 deploying and undeploying a collection level package in 196505ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 35797 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35797 (pid=3763885). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 12002ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 23:59:25.778; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:59:25.837; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-15 23:59:26.890; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:59:26.946; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 12075ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 23:59:37.372; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:59:37.432; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-15 23:59:38.522; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 23:59:38.580; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3888ms
not ok 48 basic post with a type specified in 1344ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1262ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1281ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1264ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1323ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1321ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1371ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 6257ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-16 00:00:09.019; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 00:00:09.230; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2679ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-16 00:00:11.848; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 00:00:11.909; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 11453ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:35797/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-3U7GKe%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-16 00:00:23.403; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 00:00:23.464; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:35797/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-3U7GKe%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12617ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 35797 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35797 (pid=3770300). Happy searching!
#
#     INFO  - 2023-10-16 00:00:30.946; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 00:00:30.950; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 00:00:31.435; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-3U7GKe/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-3U7GKe/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 00:00:34.348; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 00:00:34.352; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-16 00:00:35.883; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 00:00:35.888; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13124ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 35797 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35797 (pid=3770904). Happy searching!
#
#     INFO  - 2023-10-16 00:00:43.750; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 00:00:43.757; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 00:00:44.204; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-3U7GKe/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-3U7GKe/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 00:00:44.293; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-3U7GKe/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-3U7GKe/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 00:00:44.293; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-3U7GKe/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-3U7GKe/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 00:00:47.499; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 00:00:47.504; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-16 00:00:47.939; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5ae81e1[provider=null,keyStore=file:///tmp/bats-run-3U7GKe/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-3U7GKe/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-16 00:00:47.940; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5ae81e1[provider=null,keyStore=file:///tmp/bats-run-3U7GKe/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-3U7GKe/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-16 00:00:49.041; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 00:00:49.046; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-16 00:00:49.447; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@2a2da905[provider=null,keyStore=file:///tmp/bats-run-3U7GKe/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-3U7GKe/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 00:00:49.448; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@2a2da905[provider=null,keyStore=file:///tmp/bats-run-3U7GKe/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-3U7GKe/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10582ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 35797 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35797 (pid=3771510). Happy searching!
#
#     INFO  - 2023-10-16 00:00:56.743; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 00:00:56.749; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-16 00:00:59.570; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 00:00:59.575; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 14029ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-16 00:01:08.562; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-16 00:01:12.229; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-16 00:01:13.745; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 36746ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-3U7GKe/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35797 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35797 (pid=3773123). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35798 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 35798 (pid=3773233). Happy searching!
#
#     INFO  - 2023-10-16 00:01:39.280; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 00:01:39.293; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 00:01:40.161; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1536602f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-3U7GKe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3U7GKe/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 00:01:40.163; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-3U7GKe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3U7GKe/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 00:01:40.164; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(ca,h=[localhost],a=[],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-3U7GKe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3U7GKe/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 24:01:40.214 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1E DC F4 E3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:01:25.000 UTC",
#     "not  after"         : "2024-01-14 24:01:25.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 DE ED 66 26 BF F4 3F   BB 6E 19 B0 A0 03 DD 1C  ...f&..?.n......
#         0010: 2E 93 3A B3                                        ..:.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 79 FA 63 D8 20 D2 49   8D 13 62 CE 4A 47 51 6B  .y.c. .I..b.JGQk
#         0010: 01 24 D0 39                                        .$.9
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "55 37 9F 28",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:01:19.000 UTC",
#     "not  after"         : "2024-01-14 24:01:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 69 64 4B 26 5F 46 2A   92 7B B1 ED EF A1 09 47  .idK&_F*.......G
#         0010: 96 9A 0B 7D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 DE ED 66 26 BF F4 3F   BB 6E 19 B0 A0 03 DD 1C  ...f&..?.n......
#         0010: 2E 93 3A B3                                        ..:.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 24:01:40.227 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 56 DE 3F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:01:17.000 UTC",
#     "not  after"         : "2024-01-14 24:01:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 69 64 4B 26 5F 46 2A   92 7B B1 ED EF A1 09 47  .idK&_F*.......G
#         0010: 96 9A 0B 7D                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "55 37 9F 28",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:01:19.000 UTC",
#     "not  after"         : "2024-01-14 24:01:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 69 64 4B 26 5F 46 2A   92 7B B1 ED EF A1 09 47  .idK&_F*.......G
#         0010: 96 9A 0B 7D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 DE ED 66 26 BF F4 3F   BB 6E 19 B0 A0 03 DD 1C  ...f&..?.n......
#         0010: 2E 93 3A B3                                        ..:.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 24:01:40.252 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 24:01:40.529 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 24:01:40.529 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 24:01:40.531 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 24:01:40.531 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 24:01:40.535 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 24:01:40.552 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 24:01:40.552 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 24:01:40.552 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 24:01:40.554 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "49 DC FD C7 0C 28 C9 63 08 49 39 17 AD 4A 95 8C FD 17 3F 2A 8C 21 B8 0C 65 D0 16 0D C0 FC 07 EF",
#   "session id"          : "4B 26 9F 1B 37 8B C4 ED B5 B6 DD 74 66 BF 6F B4 13 0A CF 98 86 C0 56 96 07 09 57 E7 03 FC 53 94",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 97 F8 16 E0 44 A7 23 36   75 DE 37 B4 9A 73 B4 12  ....D.#6u.7..s..
#             0010: 71 52 6E 3E 8F 86 12 70   8F 9E D1 2F 02 20 97 31  qRn>...p.../. .1
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.078 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AE 05 C4 27 AB 51 AC 1C C3 A0 CB EE 21 FC 64 AB A6 0D 45 0B 3C 99 2E F1 4C 0A 86 E1 CD CE 80 DB",
#   "session id"          : "4B 26 9F 1B 37 8B C4 ED B5 B6 DD 74 66 BF 6F B4 13 0A CF 98 86 C0 56 96 07 09 57 E7 03 FC 53 94",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 59 67 C8 C6 19 AD B1 2E   8E 9A 78 A3 60 64 C6 76  Yg........x.`d.v
#           0010: 2A 05 BA 99 82 35 32 E5   5B 4C 3B 3D 39 FC 9D 64  *....52.[L;=9..d
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.078 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.078 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.084 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.085 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.085 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.085 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.085 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.085 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.085 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.085 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.087 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.087 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.087 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.087 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.088 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.088 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.093 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.093 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.093 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 24:01:41.093 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 24:01:41.093 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.105 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.107 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.108 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.119 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.119 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.119 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.119 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.119 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.119 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 24:01:41.120 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 24:01:41.120 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.121 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.121 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.121 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.126 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.127 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.127 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 24:01:41.127 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.129 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 8B 13 5F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 24:01:21.000 UTC",
#       "not  after"         : "2024-01-14 24:01:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A4 DE ED 66 26 BF F4 3F   BB 6E 19 B0 A0 03 DD 1C  ...f&..?.n......
#           0010: 2E 93 3A B3                                        ..:.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 50 B6 A1 7B A5 E8 A9 9D   78 17 8F 06 91 61 91 67  P.......x....a.g
#           0010: 1A 14 E0 45                                        ...E
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.130 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.233 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "55 37 9F 28",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:01:19.000 UTC",
#     "not  after"         : "2024-01-14 24:01:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 69 64 4B 26 5F 46 2A   92 7B B1 ED EF A1 09 47  .idK&_F*.......G
#         0010: 96 9A 0B 7D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 DE ED 66 26 BF F4 3F   BB 6E 19 B0 A0 03 DD 1C  ...f&..?.n......
#         0010: 2E 93 3A B3                                        ..:.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.242 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 79 25 8D EE 04 DC BE 5B   30 35 59 82 CD 94 D6 E1  y%.....[05Y.....
#     0010: 71 41 59 E1 81 99 6A 4D   62 F9 29 E3 DD A9 FA 07  qAY...jMb.).....
#     0020: C7 23 E5 91 C5 18 A8 F4   03 61 80 C2 3D 6D F4 88  .#.......a..=m..
#     0030: 31 CB B3 AA AB 46 A1 B4   F8 9A B6 F7 9F 4F F0 E6  1....F.......O..
#     0040: 2A 88 85 FF E7 49 27 C9   19 93 D0 91 84 82 C1 AE  *....I'.........
#     0050: A8 B6 71 D7 64 D2 66 B1   7F C7 1C 87 E3 A3 90 7A  ..q.d.f........z
#     0060: 1E CE A3 B1 9C 39 6F D6   B2 ED D5 63 35 85 20 BC  .....9o....c5. .
#     0070: 21 56 55 09 6B 0C B4 68   DB 47 00 ED 30 1E 2D 78  !VU.k..h.G..0.-x
#     0080: CA F0 AA 02 11 C1 7F 25   5B F9 64 FF 5C 34 35 C4  .......%[.d.\45.
#     0090: E1 B8 D6 1E 16 06 42 2F   5B 13 47 16 52 A1 73 80  ......B/[.G.R.s.
#     00A0: 3D D1 B5 41 EB F8 7C B3   85 DA 91 9C 4D C4 EA 8F  =..A........M...
#     00B0: EA 08 10 DA 3D F9 E1 90   4D AE 0C B0 86 7C 9E FD  ....=...M.......
#     00C0: 37 24 61 AE 5F 2F F5 FE   E7 67 CC A3 12 E5 39 57  7$a._/...g....9W
#     00D0: 50 7B 34 09 B0 C9 7F 66   30 B7 13 00 EF 1E 94 AF  P.4....f0.......
#     00E0: 8A 4F F6 58 B0 55 C6 D3   40 BF 37 EE B6 8B 34 E6  .O.X.U..@.7...4.
#     00F0: 9D E2 46 A4 C9 35 D5 1A   56 FE 0B 3A FE E6 0A 41  ..F..5..V..:...A
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.243 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5D 5D 1F F5 70 20 8A 80   3C F0 FC 97 9E 8F 94 D8  ]]..p ..<.......
#     0010: DD 29 3D D2 12 BA A6 21   56 2E B5 CB 71 44 33 A8  .)=....!V...qD3.
#     0020: 62 56 4E CB CE 75 8F F2   77 1C B5 A8 9E B9 85 1F  bVN..u..w.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 24:01:41.246 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 24:01:41.247 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-

[...truncated too long message...]

,
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D BA C2 0C B1 3E 48 59   BD 6D 7E 16 1C B0 9D EF  =....>HY.m......
#         0010: 2F 96 67 50                                        /.gP
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 1E 6B DA D7 FF B8 FF   04 76 F0 D4 D2 E8 EB 7F  =.k......v......
#         0010: 0C 5D 5F B9                                        .]_.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 24:02:24.545 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 C0 58 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:01:56.000 UTC",
#     "not  after"         : "2024-01-14 24:01:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED B6 13 A0 7E 93 00 CD   4C EE 7E E4 FE 65 D2 44  ........L....e.D
#         0010: AA D0 D9 48                                        ...H
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D BA C2 0C B1 3E 48 59   BD 6D 7E 16 1C B0 9D EF  =....>HY.m......
#         0010: 2F 96 67 50                                        /.gP
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "17 45 9D 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:01:54.000 UTC",
#     "not  after"         : "2024-01-14 24:01:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED B6 13 A0 7E 93 00 CD   4C EE 7E E4 FE 65 D2 44  ........L....e.D
#         0010: AA D0 D9 48                                        ...H
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 24:02:24.556 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14673ms
ok 65 stop command for single port in 17103ms
not ok 66 status detects locally running solr in 2672ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 3310606 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 598378 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 3310606 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 251ms
ok 68 listing out files in 2956ms
ok 69 copying files around in 6908ms
ok 70 upconfig in 2941ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1274ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1277ms
not ok 73 Cleanup in 4014ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 3310606 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 598378 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 3310606 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 5m 7s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/zisg7ds3bfq2k

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 832 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/832/

All tests passed

Build Log:
[...truncated 1166 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196528ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3449ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-15 21:34:53.452; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:34:53.508; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1223ms
not ok 8 accept d option with builtin config in 2375ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-15 21:34:57.074; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:34:57.135; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2392ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-15 21:34:59.512; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:34:59.567; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2430ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-15 21:35:01.955; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:35:02.017; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2386ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-15 21:35:04.362; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:35:04.421; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2314ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-15 21:35:06.709; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:35:06.761; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2282ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-15 21:35:09.009; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:35:09.062; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3290ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-15 21:35:17.591; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:35:17.645; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2428ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-15 21:35:20.036; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:35:20.093; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2353ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-15 21:35:22.436; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:35:22.489; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2342ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-15 21:35:24.790; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:35:24.847; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 23602ms
ok 19 Check export command in 22253ms
ok 20 export fails on non cloud mode in 8801ms
not ok 21 using curl to extract a single pdf file in 8315ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 34539 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34539 (pid=3494429). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-15 21:36:28.020; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:36:28.075; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8827ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 34539 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34539 (pid=3494854). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-15 21:36:36.886; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:36:36.944; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8570ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 34539 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34539 (pid=3495322). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-15 21:36:45.489; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:36:45.537; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30482ms
ok 25 start help flag prints help in 162ms
ok 26 stop help flag prints help in 159ms
ok 27 restart help flag prints help in 163ms
ok 28 status help flag prints help in 48ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 155ms
ok 30 create help flag prints help in 157ms
ok 31 createcore help flag prints help in 161ms
ok 32 createcollection help flag prints help in 158ms
ok 33 delete help flag prints help in 155ms
ok 34 version help flag prints help in 48ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 163ms
ok 36 auth help flag prints help in 160ms
ok 37 assert help flag prints help in 921ms
ok 38 post help flag prints help in 930ms
not ok 39 SQL Module in 9857ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:34539/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-15 21:37:29.807; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:37:29.857; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:34539/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19049ms
not ok 41 icu collation in analysis-extras module in 8493ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-15 21:37:57.406; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:37:57.459; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1325ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 598378 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10112ms
not ok 44 deploying and undeploying a collection level package in 196145ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 34539 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34539 (pid=3499391). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 11387ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 21:41:35.446; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:41:35.501; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-15 21:41:36.532; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:41:36.588; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 11300ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 21:41:46.798; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:41:46.850; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-15 21:41:47.858; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:41:47.912; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3827ms
not ok 48 basic post with a type specified in 1270ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1226ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1257ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1289ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1400ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1377ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1334ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 3949ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-15 21:42:15.506; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:42:15.564; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2400ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-15 21:42:17.926; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:42:17.986; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 11176ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:34539/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-7j5TJ1%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-15 21:42:29.216; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 21:42:29.269; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:34539/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-7j5TJ1%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12856ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 34539 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34539 (pid=3505840). Happy searching!
#
#     INFO  - 2023-10-15 21:42:36.739; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 21:42:36.745; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 21:42:37.282; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-7j5TJ1/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7j5TJ1/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 21:42:40.352; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 21:42:40.357; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-15 21:42:41.860; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 21:42:41.864; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12795ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 34539 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34539 (pid=3506449). Happy searching!
#
#     INFO  - 2023-10-15 21:42:49.495; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 21:42:49.545; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 21:42:50.156; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-7j5TJ1/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7j5TJ1/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 21:42:50.284; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-7j5TJ1/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7j5TJ1/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 21:42:50.288; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-7j5TJ1/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7j5TJ1/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 21:42:53.104; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 21:42:53.118; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-15 21:42:53.554; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-7j5TJ1/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7j5TJ1/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-15 21:42:53.556; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-7j5TJ1/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7j5TJ1/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 21:42:54.665; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 21:42:54.670; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 21:42:55.098; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@302fec27[provider=null,keyStore=file:///tmp/bats-run-7j5TJ1/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7j5TJ1/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 21:42:55.099; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@302fec27[provider=null,keyStore=file:///tmp/bats-run-7j5TJ1/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7j5TJ1/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10720ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 34539 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34539 (pid=3507057). Happy searching!
#
#     INFO  - 2023-10-15 21:43:02.384; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 21:43:02.388; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-15 21:43:05.249; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 21:43:05.254; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13393ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-15 21:43:14.078; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 21:43:17.449; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-15 21:43:18.889; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 36852ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-7j5TJ1/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 34539 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34539 (pid=3508664). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 34540 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34540 (pid=3508839). Happy searching!
#
#     INFO  - 2023-10-15 21:43:44.010; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 21:43:44.037; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 21:43:44.929; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-7j5TJ1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7j5TJ1/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 21:43:44.932; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-7j5TJ1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7j5TJ1/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 21:43:44.932; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-7j5TJ1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7j5TJ1/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 21:43:45.393 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 0D 63 96",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 21:43:30.000 UTC",
#     "not  after"         : "2024-01-13 21:43:30.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AC D7 77 2E 26 C9 96 6B   DD 34 91 0B F0 88 66 54  ..w.&..k.4....fT
#         0010: 10 A3 FD F8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA 24 3C 25 15 43 3A A0   22 CE E7 66 CA E3 91 A7  .$<%.C:."..f....
#         0010: 94 9E CE E5                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 B8 77 82",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 21:43:24.000 UTC",
#     "not  after"         : "2024-01-13 21:43:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 AA F6 5C A0 13 7B DA   EF 86 AE E7 BF 43 9D 94  c..\.........C..
#         0010: 78 8F 79 DA                                        x.y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AC D7 77 2E 26 C9 96 6B   DD 34 91 0B F0 88 66 54  ..w.&..k.4....fT
#         0010: 10 A3 FD F8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 21:43:45.398 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 B8 77 82",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 21:43:24.000 UTC",
#     "not  after"         : "2024-01-13 21:43:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 AA F6 5C A0 13 7B DA   EF 86 AE E7 BF 43 9D 94  c..\.........C..
#         0010: 78 8F 79 DA                                        x.y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AC D7 77 2E 26 C9 96 6B   DD 34 91 0B F0 88 66 54  ..w.&..k.4....fT
#         0010: 10 A3 FD F8                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 4B FE 2B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 21:43:22.000 UTC",
#     "not  after"         : "2024-01-13 21:43:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 AA F6 5C A0 13 7B DA   EF 86 AE E7 BF 43 9D 94  c..\.........C..
#         0010: 78 8F 79 DA                                        x.y.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 21:43:45.438 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 21:43:45.805 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 21:43:45.805 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 21:43:45.807 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 21:43:45.807 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 21:43:45.813 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 21:43:45.846 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 21:43:45.847 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 21:43:45.851 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 21:43:45.859 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A8 EF 5F 42 F3 CA 19 5E 44 FF 2A D2 7C 38 1B 11 C7 7A 2E 09 9F 1D 6A 67 36 C8 86 86 C5 56 A9 57",
#   "session id"          : "B1 8B DC 88 6F 2A CE E6 3E E9 C6 79 14 30 EC AA 8D E6 75 AF 27 24 B5 1C 37 68 30 DA 77 D3 6E 25",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 28 28 DB 94 DB 78 78 7D   E2 7E 4D DB 76 8F DD 66  ((...xx...M.v..f
#             0010: BC BE 12 FE D5 0D 90 DE   F7 62 0B 15 B8 08 90 7C  .........b......
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.225 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D7 42 D2 14 10 A1 9F 94 5F 7A 38 54 06 42 B7 3D 28 AC 69 B5 FB BC 9A 3A 1B D8 D6 0A AA FE D7 15",
#   "session id"          : "B1 8B DC 88 6F 2A CE E6 3E E9 C6 79 14 30 EC AA 8D E6 75 AF 27 24 B5 1C 37 68 30 DA 77 D3 6E 25",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 83 F5 0F 21 AC 88 DE 36   CE 1E 65 D5 D2 18 89 93  ...!...6..e.....
#           0010: 45 05 39 95 4A D5 79 C0   0D 2D A7 FB 12 58 1A 7E  E.9.J.y..-...X..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.228 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.228 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.230 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.235 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.235 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.235 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.235 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.235 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.235 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.236 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.236 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.236 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.236 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 21:43:46.236 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 21:43:46.236 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.236 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.236 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.251 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.252 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.253 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.260 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.261 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.261 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.261 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.261 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.261 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.261 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 21:43:46.261 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 21:43:46.261 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.262 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.263 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.263 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.263 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.264 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.264 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 21:43:46.264 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.279 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E 60 E9 37",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 21:43:26.000 UTC",
#       "not  after"         : "2024-01-13 21:43:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AC D7 77 2E 26 C9 96 6B   DD 34 91 0B F0 88 66 54  ..w.&..k.4....fT
#           0010: 10 A3 FD F8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 81 21 B7 1D E5 15 9D   5F 18 5A 20 54 82 63 0A  ..!....._.Z T.c.
#           0010: 96 64 D3 9C                                        .d..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.279 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.377 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 B8 77 82",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 21:43:24.000 UTC",
#     "not  after"         : "2024-01-13 21:43:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 AA F6 5C A0 13 7B DA   EF 86 AE E7 BF 43 9D 94  c..\.........C..
#         0010: 78 8F 79 DA                                        x.y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AC D7 77 2E 26 C9 96 6B   DD 34 91 0B F0 88 66 54  ..w.&..k.4....fT
#         0010: 10 A3 FD F8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.380 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 67 06 07 7E 4B 52 B0 F1   DE 17 38 51 9C F4 6C 75  g...KR....8Q..lu
#     0010: D0 B6 3B 9B 5B 8F 2B 18   4F 38 55 65 9F AF 7B 39  ..;.[.+.O8Ue...9
#     0020: 5B 25 78 E9 9D 56 E6 B9   E7 B4 03 17 DF A9 02 45  [%x..V.........E
#     0030: AF D1 F4 7A EB 38 50 0C   13 4F 8B 21 74 A3 30 0E  ...z.8P..O.!t.0.
#     0040: 20 E3 DE BA A3 27 42 7F   25 7E CF A3 0B 6D BE C9   ....'B.%....m..
#     0050: 71 A4 47 EE 6F CC 0E 5C   51 6B 6D 19 62 30 C1 00  q.G.o..\Qkm.b0..
#     0060: CF E3 5E CE 71 DB DC 01   C1 81 95 5D 8B 1D CD EC  ..^.q......]....
#     0070: F8 66 3F 23 2B F5 C3 96   E9 95 47 D7 AF 60 7D FF  .f?#+.....G..`..
#     0080: 77 81 27 B9 74 0C 3A EE   68 56 A8 B2 99 84 E1 5A  w.'.t.:.hV.....Z
#     0090: 9D 90 58 78 F6 D6 96 91   FC 75 C1 DB 98 67 C6 6D  ..Xx.....u...g.m
#     00A0: 5F 3E 3D 15 F2 35 67 88   0E 40 33 D3 19 5F A0 59  _>=..5g..@3.._.Y
#     00B0: 6F 83 48 3B B5 B8 CF DD   92 E0 79 1D 7A 71 90 88  o.H;......y.zq..
#     00C0: 56 DF 49 26 C4 9B F6 8A   B7 49 C7 54 7F F8 52 7C  V.I&.....I.T..R.
#     00D0: 2F AA 14 0E 7A 35 DA 0E   76 6A 27 DF 74 61 CF 66  /...z5..vj'.ta.f
#     00E0: C5 0D 73 90 25 B0 93 BF   8B 1F CF D4 96 C7 8D 69  ..s.%..........i
#     00F0: 9B 80 74 78 BF 8E F3 90   8A 74 B7 29 49 4B 9D 16  ..tx.....t.)IK..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.381 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 86 C9 D2 ED 7E 1F 19 D6   9A A6 D4 9E 7A 98 2A 45  ............z.*E
#     0010: 2E 12 41 76 42 8E C0 2D   73 51 3F BF D0 20 77 9A  ..AvB..-sQ?.. w.
#     0020: C9 70 3E 6E 32 BC 30 5B   62 BC AF E4 33 EE 91 6B  .p>n2.0[b...3..k
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 21:43:46.385 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 21:43:46.386 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-th

[...truncated too long message...]


#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B0 7A 27 C6 63 71 1E A9   12 D9 DA AF 87 BB 34 12  .z'.cq........4.
#         0010: C1 35 CA DC                                        .5..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 95 6E 71 24 B9 68 3A   68 B6 22 E1 7E 12 A3 DE  ..nq$.h:h.".....
#         0010: 5F D2 D0 30                                        _..0
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 21:44:29.510 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 05 81 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 21:44:01.000 UTC",
#     "not  after"         : "2024-01-13 21:44:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 70 94 F9 3E 85 57 05   6F 8D 85 30 D5 AF 11 E0  Ap..>.W.o..0....
#         0010: FA E7 B1 0D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B0 7A 27 C6 63 71 1E A9   12 D9 DA AF 87 BB 34 12  .z'.cq........4.
#         0010: C1 35 CA DC                                        .5..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 7F AC BC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 21:43:59.000 UTC",
#     "not  after"         : "2024-01-13 21:43:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 70 94 F9 3E 85 57 05   6F 8D 85 30 D5 AF 11 E0  Ap..>.W.o..0....
#         0010: FA E7 B1 0D                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 21:44:29.522 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 15163ms
ok 65 stop command for single port in 17623ms
not ok 66 status detects locally running solr in 2611ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 3310606 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 598378 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 3310606 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 245ms
ok 68 listing out files in 2970ms
ok 69 copying files around in 6474ms
ok 70 upconfig in 2618ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1223ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1245ms
not ok 73 Cleanup in 3585ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 3310606 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 598378 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 3310606 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 57s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/zpo5gp467yeue

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 831 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/831/

All tests passed

Build Log:
[...truncated 1165 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196673ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3318ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-15 17:33:53.935; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:33:53.998; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1202ms
not ok 8 accept d option with builtin config in 2379ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-15 17:33:57.578; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:33:57.633; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2324ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-15 17:33:59.922; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:33:59.977; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2417ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-15 17:34:02.367; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:34:02.421; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2348ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-15 17:34:04.725; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:34:04.783; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2405ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-15 17:34:07.167; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:34:07.225; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2337ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-15 17:34:09.531; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:34:09.585; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3251ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-15 17:34:18.052; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:34:18.108; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2284ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-15 17:34:20.359; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:34:20.416; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2295ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-15 17:34:22.681; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:34:22.732; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2307ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-15 17:34:25.016; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:34:25.068; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 27100ms
ok 19 Check export command in 22244ms
ok 20 export fails on non cloud mode in 8803ms
not ok 21 using curl to extract a single pdf file in 8650ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 37947 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37947 (pid=2798080). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-15 17:35:32.522; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:35:32.574; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 9469ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 37947 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37947 (pid=2798495). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-15 17:35:41.928; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:35:42.091; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8852ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 37947 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37947 (pid=2798980). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-15 17:35:50.934; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:35:50.994; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30551ms
ok 25 start help flag prints help in 160ms
ok 26 stop help flag prints help in 149ms
ok 27 restart help flag prints help in 159ms
ok 28 status help flag prints help in 45ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 148ms
ok 30 create help flag prints help in 152ms
ok 31 createcore help flag prints help in 167ms
ok 32 createcollection help flag prints help in 157ms
ok 33 delete help flag prints help in 153ms
ok 34 version help flag prints help in 46ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 158ms
ok 36 auth help flag prints help in 160ms
ok 37 assert help flag prints help in 950ms
ok 38 post help flag prints help in 963ms
not ok 39 SQL Module in 10055ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:37947/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-15 17:36:35.550; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:36:35.614; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:37947/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19083ms
not ok 41 icu collation in analysis-extras module in 8721ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-15 17:37:03.372; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:37:03.431; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1254ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10056ms
not ok 44 deploying and undeploying a collection level package in 196528ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 37947 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37947 (pid=2802998). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 11476ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 17:40:41.804; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:40:41.858; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-15 17:40:42.865; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:40:42.921; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 11335ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 17:40:53.215; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:40:53.269; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-15 17:40:54.248; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:40:54.299; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 4363ms
not ok 48 basic post with a type specified in 1400ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1231ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1329ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1247ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1511ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1349ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1316ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 4063ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-15 17:41:23.234; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:41:23.293; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2357ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-15 17:41:25.619; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:41:25.675; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10509ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:37947/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-1sFtOO%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-15 17:41:36.251; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 17:41:36.301; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:37947/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-1sFtOO%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12941ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 37947 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37947 (pid=2809358). Happy searching!
#
#     INFO  - 2023-10-15 17:41:43.704; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 17:41:43.708; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 17:41:44.130; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-1sFtOO/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-1sFtOO/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 17:41:47.454; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 17:41:47.459; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-15 17:41:48.954; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 17:41:48.958; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13414ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 37947 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37947 (pid=2809963). Happy searching!
#
#     INFO  - 2023-10-15 17:41:56.663; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 17:41:56.669; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 17:41:57.124; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2c1b9e4b(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-1sFtOO/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-1sFtOO/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 17:41:57.231; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-1sFtOO/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-1sFtOO/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 17:41:57.231; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-1sFtOO/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-1sFtOO/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 17:42:00.494; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 17:42:00.498; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-15 17:42:01.181; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@782a4fff[provider=null,keyStore=file:///tmp/bats-run-1sFtOO/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-1sFtOO/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-15 17:42:01.183; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@782a4fff[provider=null,keyStore=file:///tmp/bats-run-1sFtOO/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-1sFtOO/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 17:42:02.374; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 17:42:02.379; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 17:42:02.810; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-1sFtOO/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-1sFtOO/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 17:42:02.811; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-1sFtOO/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-1sFtOO/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 11569ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 37947 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37947 (pid=2810569). Happy searching!
#
#     INFO  - 2023-10-15 17:42:10.445; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 17:42:10.450; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-15 17:42:13.930; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 17:42:13.939; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 14145ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-15 17:42:22.584; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 17:42:26.823; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-15 17:42:28.249; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 39109ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-1sFtOO/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 37947 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37947 (pid=2812183). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 37948 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37948 (pid=2812292). Happy searching!
#
#     INFO  - 2023-10-15 17:42:53.542; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 17:42:53.553; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 17:42:54.551; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-1sFtOO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1sFtOO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 17:42:54.553; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-1sFtOO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1sFtOO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 17:42:54.554; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(ca,h=[localhost],a=[],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-1sFtOO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1sFtOO/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 17:42:54.602 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 3A E7 3C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 17:42:40.000 UTC",
#     "not  after"         : "2024-01-13 17:42:40.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BA E3 64 A7 5F 1E CA 2C   49 7E 39 9E 81 B5 4E D9  ..d._..,I.9...N.
#         0010: 21 FD A7 06                                        !...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DA A0 FC 45 AF 86 7A AF   10 B0 50 19 B4 37 CB FD  ...E..z...P..7..
#         0010: CD 7C 60 C9                                        ..`.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 77 BA 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 17:42:33.000 UTC",
#     "not  after"         : "2024-01-13 17:42:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 26 86 2D 04 40 57 EB   F7 77 FA D7 90 3A F9 7D  G&.-.@W..w...:..
#         0010: EC 1F 29 51                                        ..)Q
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA E3 64 A7 5F 1E CA 2C   49 7E 39 9E 81 B5 4E D9  ..d._..,I.9...N.
#         0010: 21 FD A7 06                                        !...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 17:42:54.614 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A A0 80 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 17:42:31.000 UTC",
#     "not  after"         : "2024-01-13 17:42:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 26 86 2D 04 40 57 EB   F7 77 FA D7 90 3A F9 7D  G&.-.@W..w...:..
#         0010: EC 1F 29 51                                        ..)Q
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 77 BA 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 17:42:33.000 UTC",
#     "not  after"         : "2024-01-13 17:42:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 26 86 2D 04 40 57 EB   F7 77 FA D7 90 3A F9 7D  G&.-.@W..w...:..
#         0010: EC 1F 29 51                                        ..)Q
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA E3 64 A7 5F 1E CA 2C   49 7E 39 9E 81 B5 4E D9  ..d._..,I.9...N.
#         0010: 21 FD A7 06                                        !...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 17:42:54.666 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 17:42:55.110 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 17:42:55.110 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 17:42:55.110 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 17:42:55.110 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 17:42:55.139 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 17:42:55.139 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 17:42:55.141 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 17:42:55.141 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 17:42:55.147 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 17:42:55.175 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 17:42:55.175 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 17:42:55.175 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 17:42:55.177 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "78 75 00 3E 5A 68 8E 1C 73 9F A7 2B 17 3A CF 50 D3 26 DF 4D 00 A6 E5 32 51 CA B2 F1 FB D3 F4 9B",
#   "session id"          : "AA 6C C4 E0 AE 77 BA A6 2E F3 0E 86 FD F7 64 C3 BE 1C 50 6E 68 38 F6 28 F0 5E 4E 1E 2C 3B 3E 6C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 16 25 97 26 09 0E 9C B1   4C 88 C3 FD AB 55 E6 2A  .%.&....L....U.*
#             0010: 68 3A 26 C6 12 EE 3B CA   6C 7A DD 3E F6 98 0F 0C  h:&...;.lz.>....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.289 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0A 50 31 A6 EB 43 69 FB 17 C3 E1 66 0D 4B F1 A0 33 83 B6 F0 54 3C B3 0C 58 11 55 71 51 77 05 23",
#   "session id"          : "AA 6C C4 E0 AE 77 BA A6 2E F3 0E 86 FD F7 64 C3 BE 1C 50 6E 68 38 F6 28 F0 5E 4E 1E 2C 3B 3E 6C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4F C7 86 B3 91 CE C6 DD   99 53 ED 8D D2 3F 79 F0  O........S...?y.
#           0010: D9 C3 17 39 19 53 60 4E   74 BE C4 A1 BB AB 62 73  ...9.S`Nt.....bs
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.289 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.289 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.290 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.290 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.290 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.290 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.290 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.290 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.291 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.291 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.297 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.297 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.297 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.297 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.298 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 17:42:55.300 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 17:42:55.300 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.329 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.330 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.331 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.334 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.334 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.335 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.335 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.335 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.335 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.335 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 17:42:55.335 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 17:42:55.335 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.343 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.343 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.344 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.344 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.345 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.345 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 17:42:55.345 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.363 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 AC B6 C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 17:42:35.000 UTC",
#       "not  after"         : "2024-01-13 17:42:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BA E3 64 A7 5F 1E CA 2C   49 7E 39 9E 81 B5 4E D9  ..d._..,I.9...N.
#           0010: 21 FD A7 06                                        !...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 F3 29 33 E5 5E A7 89   26 3F 47 75 CC F3 D7 A9  ..)3.^..&?Gu....
#           0010: 9B 43 14 3A                                        .C.:
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.363 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.483 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 77 BA 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 17:42:33.000 UTC",
#     "not  after"         : "2024-01-13 17:42:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 26 86 2D 04 40 57 EB   F7 77 FA D7 90 3A F9 7D  G&.-.@W..w...:..
#         0010: EC 1F 29 51                                        ..)Q
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA E3 64 A7 5F 1E CA 2C   49 7E 39 9E 81 B5 4E D9  ..d._..,I.9...N.
#         0010: 21 FD A7 06                                        !...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.494 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3E 62 A9 58 40 58 39 76   2C 76 45 29 77 67 D5 27  >b.X@X9v,vE)wg.'
#     0010: FA A1 AB E6 59 45 C6 2F   56 A2 01 FC 58 31 51 46  ....YE./V...X1QF
#     0020: 9F EF A0 DA 76 E3 26 C6   CD 2E F5 F9 3D 31 11 25  ....v.&.....=1.%
#     0030: CD DC D9 AA 5E E6 28 46   09 AF F0 04 28 65 E8 50  ....^.(F....(e.P
#     0040: BC 2C CA 8E 6D 4C 56 E9   9F 49 BE F4 6F 97 5C 47  .,..mLV..I..o.\G
#     0050: CB C3 E1 9E 88 BE 4B 93   A4 26 BA 1E 05 FE E8 5F  ......K..&....._
#     0060: 0C B4 D0 39 A4 47 9C 2B   DF 63 BB 32 D1 85 9E 5A  ...9.G.+.c.2...Z
#     0070: D5 BD 51 49 10 AE 6B 7A   74 9D C2 9C 99 94 28 E9  ..QI..kzt.....(.
#     0080: D7 84 15 06 D6 92 2D 86   4A 7E C3 69 52 8A 61 BF  ......-.J..iR.a.
#     0090: 58 13 C2 53 98 43 43 B2   8F AF F9 B2 40 C0 08 9F  X..S.CC.....@...
#     00A0: ED 24 46 A0 B2 6F 54 CA   3F 5D A5 E9 7C 55 50 26  .$F..oT.?]...UP&
#     00B0: AA 50 E9 44 3D F8 2D 8A   DD 10 5A 5F 3D B2 52 CB  .P.D=.-...Z_=.R.
#     00C0: C4 8D D0 A2 4D 2F 65 93   81 C0 99 23 97 C8 DB 2F  ....M/e....#.../
#     00D0: BB 3C 00 FA 6C 10 9B 7B   9F B4 D8 6E 37 19 B3 BD  .<..l......n7...
#     00E0: BB C4 36 EF 0F F9 F5 A5   B0 CC 76 3A 1C 9F 03 29  ..6.......v:...)
#     00F0: FC C2 9C DF 8F 98 4D 13   EA 66 4C 51 75 3A 5C 55  ......M..fLQu:\U
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 17:42:55.754 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 20 D1 40 5F 36 AB A4 51   C8 42 CA 9D AB A4 4E 6B   .@_6..Q.B....Nk
#     0010: FE 5E F0 6A 4A AE CF 96   27 96 4F 

[...truncated too long message...]

 : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A E0 17 F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 17:43:19.000 UTC",
#     "not  after"         : "2024-01-13 17:43:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 06 60 3C 6E 4B 66 D2   C9 75 40 46 AF 9D 03 A8  ..`<nKf..u@F....
#         0010: 5D A2 EA 76                                        ]..v
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 04 AC 57 63 63 71 B7   A3 E0 83 0B 3E 4E 7E 51  ...Wccq.....>N.Q
#         0010: 52 7B EC CB                                        R...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 17:43:40.754 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D 7F 88 C8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 17:43:12.000 UTC",
#     "not  after"         : "2024-01-13 17:43:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 F3 16 C7 CB 3D B7 05   9C 32 58 05 1F 42 7F DE  `....=...2X..B..
#         0010: 7C C0 4D 6F                                        ..Mo
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 06 60 3C 6E 4B 66 D2   C9 75 40 46 AF 9D 03 A8  ..`<nKf..u@F....
#         0010: 5D A2 EA 76                                        ]..v
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 97 75 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 17:43:10.000 UTC",
#     "not  after"         : "2024-01-13 17:43:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 F3 16 C7 CB 3D B7 05   9C 32 58 05 1F 42 7F DE  `....=...2X..B..
#         0010: 7C C0 4D 6F                                        ..Mo
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 17:43:40.765 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14602ms
ok 65 stop command for single port in 17644ms
not ok 66 status detects locally running solr in 1462ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 238ms
ok 68 listing out files in 2895ms
ok 69 copying files around in 6428ms
ok 70 upconfig in 2568ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1222ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1224ms
not ok 73 Cleanup in 2443ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 3m 45s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/ci4zlgsn4jums

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 830 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/830/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 197795ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 4599ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-15 14:22:32.247; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:22:33.408; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 2353ms
not ok 8 accept d option with builtin config in 2370ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-15 14:22:38.160; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:22:38.213; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2430ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-15 14:22:40.582; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:22:40.642; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 3562ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-15 14:22:43.035; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:22:44.209; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 3414ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-15 14:22:46.546; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:22:47.700; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2336ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-15 14:22:49.993; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:22:50.046; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2265ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-15 14:22:52.287; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:22:52.344; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3354ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-15 14:23:00.979; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:23:01.033; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2365ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-15 14:23:03.368; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:23:03.422; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 5667ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-15 14:23:05.736; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:23:09.098; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 3409ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-15 14:23:11.412; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:23:12.563; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 26715ms
ok 19 Check export command in 22335ms
ok 20 export fails on non cloud mode in 8761ms
not ok 21 using curl to extract a single pdf file in 8300ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 37747 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37747 (pid=1421). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-15 14:24:18.902; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:24:18.954; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 9781ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 37747 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37747 (pid=1899). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-15 14:24:27.607; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:24:28.765; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8382ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 37747 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37747 (pid=2384). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-15 14:24:37.098; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:24:37.154; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30526ms
ok 25 start help flag prints help in 194ms
ok 26 stop help flag prints help in 206ms
ok 27 restart help flag prints help in 173ms
ok 28 status help flag prints help in 54ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 160ms
ok 30 create help flag prints help in 165ms
ok 31 createcore help flag prints help in 164ms
ok 32 createcollection help flag prints help in 169ms
ok 33 delete help flag prints help in 166ms
ok 34 version help flag prints help in 56ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 167ms
ok 36 auth help flag prints help in 170ms
ok 37 assert help flag prints help in 965ms
ok 38 post help flag prints help in 957ms
not ok 39 SQL Module in 10040ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:37747/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-15 14:25:21.925; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:25:21.983; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:37747/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 21327ms
not ok 41 icu collation in analysis-extras module in 8620ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-15 14:25:51.942; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:25:51.999; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1289ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 9920 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9916ms
not ok 44 deploying and undeploying a collection level package in 196348ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 37747 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37747 (pid=6507). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 13453ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 14:29:29.889; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:29:29.944; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-15 14:29:30.937; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:29:33.191; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 14151ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 14:29:43.541; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:29:45.795; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-15 14:29:46.811; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:29:46.870; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3887ms
not ok 48 basic post with a type specified in 1362ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1246ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1241ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1355ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1901ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 2022ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1664ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 7676ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-15 14:30:17.091; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:30:20.448; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2536ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-15 14:30:22.983; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:30:23.039; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 16613ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:37747/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-CnsBLP%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-15 14:30:33.089; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 14:30:39.769; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:37747/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-CnsBLP%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12606ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 37747 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37747 (pid=12762). Happy searching!
#
#     INFO  - 2023-10-15 14:30:47.165; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:30:47.169; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 14:30:47.646; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-CnsBLP/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnsBLP/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 14:30:50.490; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 14:30:50.495; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-15 14:30:52.079; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:30:52.084; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12299ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 37747 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37747 (pid=13360). Happy searching!
#
#     INFO  - 2023-10-15 14:30:59.665; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:30:59.669; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 14:31:00.040; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-CnsBLP/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnsBLP/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 14:31:00.138; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-CnsBLP/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnsBLP/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 14:31:00.138; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-CnsBLP/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnsBLP/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 14:31:02.915; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 14:31:02.920; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-15 14:31:03.360; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-CnsBLP/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnsBLP/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-15 14:31:03.361; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-CnsBLP/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnsBLP/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 14:31:04.460; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:31:04.464; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 14:31:04.873; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-CnsBLP/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnsBLP/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 14:31:04.875; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@48c40605[provider=null,keyStore=file:///tmp/bats-run-CnsBLP/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-CnsBLP/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10426ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 37747 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37747 (pid=14081). Happy searching!
#
#     INFO  - 2023-10-15 14:31:12.091; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:31:12.096; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-15 14:31:14.900; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:31:14.912; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13832ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-15 14:31:23.797; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 14:31:27.353; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-15 14:31:28.770; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 38856ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-CnsBLP/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 37747 [|]   [/]   [-]   [\]
# Started Solr server on port 37747 (pid=15663). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 37748 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37748 (pid=15770). Happy searching!
#
#     INFO  - 2023-10-15 14:31:52.610; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:31:52.614; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 14:31:52.963; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-CnsBLP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CnsBLP/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 14:31:52.966; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-CnsBLP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CnsBLP/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 14:31:52.966; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-CnsBLP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CnsBLP/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:31:53.007 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 90 6D F5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:31:40.000 UTC",
#     "not  after"         : "2024-01-13 14:31:40.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C1 09 8C 14 BD 1A 2C 53   00 42 6E F0 B9 B6 8D 06  ......,S.Bn.....
#         0010: 7A A1 2A D3                                        z.*.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 95 53 07 D6 7F 75 13   54 17 CD 18 0A 52 0E 21  ..S...u.T....R.!
#         0010: A1 9F 40 C3                                        ..@.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A F2 01 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:31:34.000 UTC",
#     "not  after"         : "2024-01-13 14:31:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 68 9F 5D 43 9C 01 9E   07 DB B9 23 CF 13 5C CC  ch.]C......#..\.
#         0010: AA 80 07 5E                                        ...^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C1 09 8C 14 BD 1A 2C 53   00 42 6E F0 B9 B6 8D 06  ......,S.Bn.....
#         0010: 7A A1 2A D3                                        z.*.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:31:53.011 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A F2 01 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:31:34.000 UTC",
#     "not  after"         : "2024-01-13 14:31:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 68 9F 5D 43 9C 01 9E   07 DB B9 23 CF 13 5C CC  ch.]C......#..\.
#         0010: AA 80 07 5E                                        ...^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C1 09 8C 14 BD 1A 2C 53   00 42 6E F0 B9 B6 8D 06  ......,S.Bn.....
#         0010: 7A A1 2A D3                                        z.*.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "25 44 A5 B9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:31:32.000 UTC",
#     "not  after"         : "2024-01-13 14:31:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 68 9F 5D 43 9C 01 9E   07 DB B9 23 CF 13 5C CC  ch.]C......#..\.
#         0010: AA 80 07 5E                                        ...^
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:31:53.022 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:31:53.204 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:31:53.205 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:31:53.206 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:31:53.206 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:31:53.211 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:31:53.221 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:31:53.221 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:31:53.222 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:31:53.224 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0B 71 B0 5E 09 8B 0A 2E 2C F1 04 7B 4A 26 77 82 7B AE AB EC D7 6F 07 D9 0D F4 86 F6 C2 13 D7 D2",
#   "session id"          : "4E 76 4A 16 F6 32 8F AC 30 82 E3 1F 98 90 75 65 6F F6 AA E2 52 FE 1E 70 C6 01 01 5C B0 3E D1 92",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 88 81 3C F5 3C 29 D4 69   CA D5 BB B1 B8 CB 2B 53  ..<.<).i......+S
#             0010: AA 41 85 23 A7 E0 E6 5C   3C EB F3 EE 8D 6E 66 05  .A.#...\<....nf.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.329 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "60 43 D0 88 B7 FD E7 AE 2C 51 F0 7E CB 11 99 CA 95 1B B8 80 4A A9 F1 00 89 DC AF 8A 90 08 10 D2",
#   "session id"          : "4E 76 4A 16 F6 32 8F AC 30 82 E3 1F 98 90 75 65 6F F6 AA E2 52 FE 1E 70 C6 01 01 5C B0 3E D1 92",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 68 93 3E 73 86 5F FB F8   7E 33 42 71 B7 A7 F9 01  h.>s._...3Bq....
#           0010: CC 6F AF 03 8B 92 10 D6   FE 15 08 BE F3 6D 7D 07  .o...........m..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.329 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.330 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.331 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.331 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.332 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.332 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.332 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.332 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.333 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.333 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.335 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.340 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.341 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.341 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.342 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.342 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.342 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:31:53.346 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:31:53.346 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.347 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.347 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.364 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.366 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.372 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.376 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.376 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.376 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.376 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.376 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.376 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.376 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:31:53.376 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:31:53.376 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.389 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.389 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.390 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.390 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.390 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.391 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:31:53.391 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.393 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 2D 47 22",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:31:36.000 UTC",
#       "not  after"         : "2024-01-13 14:31:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C1 09 8C 14 BD 1A 2C 53   00 42 6E F0 B9 B6 8D 06  ......,S.Bn.....
#           0010: 7A A1 2A D3                                        z.*.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E3 F0 A2 6F 07 E0 CA DE   AC CD F9 54 1B 7F B3 44  ...o.......T...D
#           0010: 55 1C 81 4D                                        U..M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.394 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:31:53.745 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A F2 01 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:31:34.000 UTC",
#     "not  after"         : "2024-01-13 14:31:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 68 9F 5D 43 9C 01 9E   07 DB B9 23 CF 13 5C CC  ch.]C......#..\.
#         0010: AA 80 07 5E                                        ...^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2

[...truncated too long message...]

e [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 77 68 82 6C BC AB B1   63 AB 49 99 95 ED 14 13  `wh.l...c.I.....
#         0010: 00 C9 20 42                                        .. B
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:32:41.842 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 79 6B 70",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:32:13.000 UTC",
#     "not  after"         : "2024-01-13 14:32:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 D1 1B C3 22 EA DD 94   D6 D0 1C 6D 5C B1 C5 95  ...."......m\...
#         0010: 2B 05 B7 8E                                        +...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE AB 5A EC B6 86 49 80   13 4D DE F8 FB 66 F8 BE  ..Z...I..M...f..
#         0010: 11 EE 89 92                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 8F 80 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:32:11.000 UTC",
#     "not  after"         : "2024-01-13 14:32:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 D1 1B C3 22 EA DD 94   D6 D0 1C 6D 5C B1 C5 95  ...."......m\...
#         0010: 2B 05 B7 8E                                        +...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:32:41.855 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14398ms
ok 65 stop command for single port in 17198ms
not ok 66 status detects locally running solr in 2628ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 4383 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 4383 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 247ms
ok 68 listing out files in 6144ms
ok 69 copying files around in 8665ms
ok 70 upconfig in 2739ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1205ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1211ms
not ok 73 Cleanup in 3538ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (9 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 4383 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 4383 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 18s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/72pv42l5fqqwq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 829 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/829/

1 tests failed.
FAILED:  org.apache.solr.cloud.OverseerTest.testShardLeaderChange

Error Message:
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=6653, name=OverseerCollectionConfigSetProcessor-72115473041391618-127.0.0.1:42863_solr-n_0000000000, state=RUNNABLE, group=Overseer collection creation process.]

Stack Trace:
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=6653, name=OverseerCollectionConfigSetProcessor-72115473041391618-127.0.0.1:42863_solr-n_0000000000, state=RUNNABLE, group=Overseer collection creation process.]
	at __randomizedtesting.SeedInfo.seed([6948CF6D3F1DEE59:B71B489A25851BA8]:0)
Caused by: org.apache.solr.common.AlreadyClosedException
	at __randomizedtesting.SeedInfo.seed([6948CF6D3F1DEE59]:0)
	at app//org.apache.solr.common.cloud.ZkCmdExecutor.retryOperation(ZkCmdExecutor.java:68)
	at app//org.apache.solr.common.cloud.SolrZkClient.getData(SolrZkClient.java:436)
	at app//org.apache.solr.cloud.OverseerTaskProcessor.amILeader(OverseerTaskProcessor.java:486)
	at app//org.apache.solr.cloud.OverseerTaskProcessor.run(OverseerTaskProcessor.java:171)
	at java.base@11.0.16.1/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 47140 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196935ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3619ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-15 12:20:26.949; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:20:27.008; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1288ms
not ok 8 accept d option with builtin config in 2468ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-15 12:20:30.764; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:20:30.818; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2547ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-15 12:20:33.329; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:20:33.383; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2527ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-15 12:20:35.872; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:20:35.938; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2442ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-15 12:20:38.355; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:20:38.409; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2444ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-15 12:20:40.812; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:20:40.877; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2403ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-15 12:20:43.259; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:20:43.313; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3522ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-15 12:20:52.041; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:20:52.094; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2366ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-15 12:20:54.442; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:20:54.498; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2377ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-15 12:20:56.839; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:20:56.901; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2417ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-15 12:20:59.286; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:20:59.346; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 27990ms
ok 19 Check export command in 26758ms
ok 20 export fails on non cloud mode in 9638ms
not ok 21 using curl to extract a single pdf file in 9696ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 44575 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44575 (pid=2072892). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-15 12:22:13.628; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:22:13.685; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 11523ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 44575 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44575 (pid=2073369). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-15 12:22:25.145; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:22:25.206; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 12503ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 44575 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44575 (pid=2075066). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-15 12:22:37.390; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:22:37.464; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 33370ms
ok 25 start help flag prints help in 170ms
ok 26 stop help flag prints help in 164ms
ok 27 restart help flag prints help in 166ms
ok 28 status help flag prints help in 46ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 164ms
ok 30 create help flag prints help in 160ms
ok 31 createcore help flag prints help in 163ms
ok 32 createcollection help flag prints help in 163ms
ok 33 delete help flag prints help in 162ms
ok 34 version help flag prints help in 47ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 165ms
ok 36 auth help flag prints help in 166ms
ok 37 assert help flag prints help in 997ms
ok 38 post help flag prints help in 1002ms
not ok 39 SQL Module in 10246ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:44575/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-15 12:23:25.568; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:23:25.622; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:44575/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19234ms
not ok 41 icu collation in analysis-extras module in 8714ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-15 12:23:53.566; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:23:53.624; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1285ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10327ms
not ok 44 deploying and undeploying a collection level package in 196603ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 44575 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44575 (pid=2079823). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 11915ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 12:27:32.725; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:27:32.779; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-15 12:27:33.848; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:27:33.901; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 11772ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 12:27:44.540; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:27:44.597; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-15 12:27:45.651; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:27:45.711; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 4617ms
not ok 48 basic post with a type specified in 1457ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1381ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1304ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1339ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1424ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1401ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1390ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 4460ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-15 12:28:15.225; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:28:15.283; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2600ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-15 12:28:17.851; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:28:17.905; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10847ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:44575/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-PrB29p%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-15 12:28:28.802; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 12:28:28.856; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:44575/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-PrB29p%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 13627ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 44575 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44575 (pid=2086183). Happy searching!
#
#     INFO  - 2023-10-15 12:28:36.636; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 12:28:36.644; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 12:28:37.081; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-PrB29p/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-PrB29p/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 12:28:40.611; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 12:28:40.616; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-15 12:28:42.243; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 12:28:42.248; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13507ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 44575 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44575 (pid=2086794). Happy searching!
#
#     INFO  - 2023-10-15 12:28:50.178; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 12:28:50.182; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 12:28:50.570; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-PrB29p/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-PrB29p/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 12:28:50.651; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-PrB29p/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-PrB29p/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 12:28:50.652; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-PrB29p/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-PrB29p/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 12:28:54.062; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 12:28:54.067; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-15 12:28:54.485; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-PrB29p/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-PrB29p/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-15 12:28:54.487; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-PrB29p/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-PrB29p/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 12:28:55.635; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 12:28:55.640; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 12:28:56.110; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@302fec27[provider=null,keyStore=file:///tmp/bats-run-PrB29p/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-PrB29p/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 12:28:56.112; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@302fec27[provider=null,keyStore=file:///tmp/bats-run-PrB29p/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-PrB29p/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 11550ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 44575 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44575 (pid=2087398). Happy searching!
#
#     INFO  - 2023-10-15 12:29:03.829; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 12:29:03.835; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-15 12:29:06.969; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 12:29:06.973; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 14503ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-15 12:29:16.378; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 12:29:20.444; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-15 12:29:21.988; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 37363ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-PrB29p/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 44575 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44575 (pid=2089062). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 44576 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44576 (pid=2089173). Happy searching!
#
#     INFO  - 2023-10-15 12:29:47.614; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 12:29:47.625; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 12:29:48.487; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-PrB29p/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PrB29p/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 12:29:48.489; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-PrB29p/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PrB29p/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 12:29:48.491; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(ca,h=[localhost],a=[],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-PrB29p/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PrB29p/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 12:29:48.565 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 37 D4 A3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 12:29:34.000 UTC",
#     "not  after"         : "2024-01-13 12:29:34.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5C 38 BB 7B D6 7A 4A 6F   AF 91 44 0E 99 B3 12 45  \8...zJo..D....E
#         0010: BA DE 12 07                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 65 D4 88 1F 64 D8 8E   A8 2E A2 2C F7 E7 BD 56  Ae...d.....,...V
#         0010: 0D E7 D1 21                                        ...!
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C 8A 2D 2C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 12:29:27.000 UTC",
#     "not  after"         : "2024-01-13 12:29:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 B6 2A E8 43 0C F8 36   C8 64 B1 16 72 C4 06 F3  H.*.C..6.d..r...
#         0010: B6 80 C2 E9                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5C 38 BB 7B D6 7A 4A 6F   AF 91 44 0E 99 B3 12 45  \8...zJo..D....E
#         0010: BA DE 12 07                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 12:29:48.575 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B DB 73 A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 12:29:25.000 UTC",
#     "not  after"         : "2024-01-13 12:29:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 B6 2A E8 43 0C F8 36   C8 64 B1 16 72 C4 06 F3  H.*.C..6.d..r...
#         0010: B6 80 C2 E9                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C 8A 2D 2C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 12:29:27.000 UTC",
#     "not  after"         : "2024-01-13 12:29:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 B6 2A E8 43 0C F8 36   C8 64 B1 16 72 C4 06 F3  H.*.C..6.d..r...
#         0010: B6 80 C2 E9                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5C 38 BB 7B D6 7A 4A 6F   AF 91 44 0E 99 B3 12 45  \8...zJo..D....E
#         0010: BA DE 12 07                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 12:29:48.593 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 12:29:48.956 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 12:29:48.956 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 12:29:48.958 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 12:29:48.958 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 12:29:48.970 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 12:29:48.994 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 12:29:48.994 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 12:29:48.995 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 12:29:48.996 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "B7 05 8D 8A 5A 94 D5 E4 35 91 F2 89 F9 E4 E9 7F A9 69 C7 EF 3A 4C BF 57 B5 C3 DE 14 A6 BC F2 FF",
#   "session id"          : "E4 2A 46 A2 4C DC 79 2B 00 AB E6 08 50 E6 33 7C 1D 89 9D D0 09 D8 7E 88 06 05 85 30 65 A7 03 5F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 33 9F 7F C2 25 74 88 96   C4 41 C6 A8 0E 95 D5 AF  3...%t...A......
#             0010: AB D8 CA EC 88 13 4F E9   AF 8B E5 80 D4 80 88 6D  ......O........m
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.386 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AC 1B ED 31 62 84 78 33 30 0E 31 2D 6A 5F 92 38 60 84 3E 89 B7 3C 21 8F 70 09 36 AD 10 64 A1 8B",
#   "session id"          : "E4 2A 46 A2 4C DC 79 2B 00 AB E6 08 50 E6 33 7C 1D 89 9D D0 09 D8 7E 88 06 05 85 30 65 A7 03 5F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3E 50 02 A8 A8 F4 5E 6A   0F B0 2E 8E D4 4E 1F 09  >P....^j.....N..
#           0010: 4A C5 0C 37 50 CB A0 72   6D B1 67 3B 11 8C 88 6D  J..7P..rm.g;...m
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.386 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.386 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.388 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.388 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.388 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.389 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.389 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.389 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.389 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.389 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.399 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.399 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.400 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 12:29:49.400 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 12:29:49.400 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.401 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.401 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.424 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.441 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.442 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.461 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.461 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.461 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.462 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.462 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.462 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.462 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 12:29:49.462 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 12:29:49.462 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.463 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.464 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.466 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.471 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.472 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.472 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 12:29:49.472 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.490 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "68 09 18 27",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 12:29:30.000 UTC",
#       "not  after"         : "2024-01-13 12:29:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5C 38 BB 7B D6 7A 4A 6F   AF 91 44 0E 99 B3 12 45  \8...zJo..D....E
#           0010: BA DE 12 07                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 58 69 28 62 BB 75 6F   A5 77 1E 1B 42 B9 97 EC  .Xi(b.uo.w..B...
#           0010: 0C 91 FD 02                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.490 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.799 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C 8A 2D 2C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 12:29:27.000 UTC",
#     "not  after"         : "2024-01-13 12:29:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 B6 2A E8 43 0C F8 36   C8 64 B1 16 72 C4 06 F3  H.*.C..6.d..r...
#         0010: B6 80 C2 E9                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5C 38 BB 7B D6 7A 4A 6F   AF 91 44 0E 99 B3 12 45  \8...zJo..D....E
#         0010: BA DE 12 07                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 12:29:49.802 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 64 B6 E6 F9 1C 9C 91 3A   72 89 3E DA 3C 9B 3A 63  d......:r.>.<.:c
#     0010: BC 46 DC AE 52 43 A9 FC   AD B4 07 4A 46 75 40 66  .F..RC.....JFu@f
#     0020: 24 78 66 78 38 83 F9 23   1C 6B A7 D6 A8 54 11 55  $xfx8..#.k...T.U
#     0030: 56 A8 4C 39 8A D4 68 FF   34 7C 9A 4A AB 7A 19 D1  V.L9..h.4..J.z..
#     0040: 96 A7 FB 54 15 7B 3A 15   C4 8B 96 1D 8C 8E DC 82  ...T..:.........
#     0050: AA 0A 8C 8C DE 7C 01 4E   FD E0 6D 09 DA E4 70 78  .......N..m...px
#     0060: 3A B5 5D F2 B6 5C 87 EF   D2 72 7D 9B A0 59 FD 3D  :.]..\...r...Y.=
#     0070: 3B F1 FE C3 71 E7 AF 1F   C2 52 4F 4D CE 67 29 A0  ;...q....ROM.g).
#     0080: E8 BB D5 1E 73 A6 6E 2B   EB B7 C3 03 5C 7C 25 70  ....s.n+....\.%p
#     0090: 2D 22 37 F6 39 07 5B B9   E4 C2 BF ED A6 3B 06 AF  -"7.9.[......;..
#

[...truncated too long message...]

tyKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 E6 0D 9B B2 38 68 9A   E3 E9 F9 7A 15 D3 E8 36  `....8h....z...6
#         0010: 36 FB 1F BF                                        6...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 68 F4 17 4C DD DC 57   E7 70 C7 EA 3F EC 11 36  Oh..L..W.p..?..6
#         0010: 4B 9D 9C 76                                        K..v
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 12:30:35.903 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 24 89 C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 12:30:02.000 UTC",
#     "not  after"         : "2024-01-13 12:30:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D 72 D9 37 AE B1 36 F6   41 78 F5 2C DF 10 63 01  .r.7..6.Ax.,..c.
#         0010: 14 95 6D F6                                        ..m.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 8C EE CD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 12:30:05.000 UTC",
#     "not  after"         : "2024-01-13 12:30:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D 72 D9 37 AE B1 36 F6   41 78 F5 2C DF 10 63 01  .r.7..6.Ax.,..c.
#         0010: 14 95 6D F6                                        ..m.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 E6 0D 9B B2 38 68 9A   E3 E9 F9 7A 15 D3 E8 36  `....8h....z...6
#         0010: 36 FB 1F BF                                        6...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 12:30:35.916 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 15421ms
ok 65 stop command for single port in 18629ms
not ok 66 status detects locally running solr in 1495ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 253ms
ok 68 listing out files in 2804ms
ok 69 copying files around in 6587ms
ok 70 upconfig in 3000ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1227ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1251ms
not ok 73 Cleanup in 2522ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.OverseerTest.testShardLeaderChange (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.OverseerTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.OverseerTest.testShardLeaderChange" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6948CF6D3F1DEE59 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 5m 38s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/l47s25ut2q54q

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 828 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/828/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196718ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3846ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-15 10:06:07.670; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:06:07.737; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1275ms
not ok 8 accept d option with builtin config in 2559ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-15 10:06:11.596; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:06:11.654; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2533ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-15 10:06:14.170; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:06:14.230; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2503ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-15 10:06:16.699; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:06:16.757; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2432ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-15 10:06:19.138; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:06:19.201; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2460ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-15 10:06:21.645; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:06:21.703; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2465ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-15 10:06:24.117; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:06:24.188; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3737ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-15 10:06:33.179; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:06:33.260; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2526ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-15 10:06:35.724; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:06:35.787; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2490ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-15 10:06:38.264; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:06:38.329; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2466ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-15 10:06:40.753; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:06:40.816; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 26348ms
ok 19 Check export command in 24144ms
ok 20 export fails on non cloud mode in 9078ms
not ok 21 using curl to extract a single pdf file in 9018ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 33941 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33941 (pid=1787625). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-15 10:07:49.638; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:07:49.700; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 9415ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 33941 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33941 (pid=1788094). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-15 10:07:59.079; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:07:59.140; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 9171ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 33941 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33941 (pid=1788514). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-15 10:08:08.246; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:08:08.302; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 31013ms
ok 25 start help flag prints help in 174ms
ok 26 stop help flag prints help in 160ms
ok 27 restart help flag prints help in 169ms
ok 28 status help flag prints help in 53ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 165ms
ok 30 create help flag prints help in 162ms
ok 31 createcore help flag prints help in 164ms
ok 32 createcollection help flag prints help in 161ms
ok 33 delete help flag prints help in 175ms
ok 34 version help flag prints help in 49ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 167ms
ok 36 auth help flag prints help in 164ms
ok 37 assert help flag prints help in 988ms
ok 38 post help flag prints help in 1017ms
not ok 39 SQL Module in 10365ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:33941/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-15 10:08:53.879; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:08:53.942; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:33941/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19469ms
not ok 41 icu collation in analysis-extras module in 9208ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-15 10:09:22.595; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:09:22.657; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1338ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10204ms
not ok 44 deploying and undeploying a collection level package in 196355ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 33941 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33941 (pid=1792662). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 11954ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 10:13:01.482; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:13:01.546; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-15 10:13:02.623; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:13:02.676; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 12253ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 10:13:13.781; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:13:13.841; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-15 10:13:14.928; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:13:14.984; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 4640ms
not ok 48 basic post with a type specified in 1462ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1299ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1323ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1294ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1386ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1420ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1399ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 4522ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-15 10:13:44.176; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:13:44.528; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2564ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-15 10:13:47.051; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:13:47.113; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10852ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:33941/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-Qwb2MF%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-15 10:13:58.039; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:13:58.096; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:33941/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-Qwb2MF%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 13142ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 33941 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33941 (pid=1799021). Happy searching!
#
#     INFO  - 2023-10-15 10:14:05.709; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 10:14:05.715; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 10:14:06.115; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-Qwb2MF/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Qwb2MF/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 10:14:09.355; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 10:14:09.360; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-15 10:14:10.938; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 10:14:10.943; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13628ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 33941 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33941 (pid=1799633). Happy searching!
#
#     INFO  - 2023-10-15 10:14:19.056; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 10:14:19.061; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 10:14:19.529; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-Qwb2MF/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Qwb2MF/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 10:14:19.663; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-Qwb2MF/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Qwb2MF/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 10:14:19.665; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-Qwb2MF/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Qwb2MF/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 10:14:22.868; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 10:14:22.873; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-15 10:14:23.290; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@54709809[provider=null,keyStore=file:///tmp/bats-run-Qwb2MF/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Qwb2MF/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-15 10:14:23.291; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@54709809[provider=null,keyStore=file:///tmp/bats-run-Qwb2MF/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Qwb2MF/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 10:14:24.541; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 10:14:24.547; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 10:14:25.003; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@2fd1731c[provider=null,keyStore=file:///tmp/bats-run-Qwb2MF/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Qwb2MF/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 10:14:25.005; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@2fd1731c[provider=null,keyStore=file:///tmp/bats-run-Qwb2MF/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Qwb2MF/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 11033ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 33941 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33941 (pid=1800238). Happy searching!
#
#     INFO  - 2023-10-15 10:14:32.607; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 10:14:32.611; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-15 10:14:35.384; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 10:14:35.393; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 14789ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-15 10:14:44.600; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 10:14:48.979; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-15 10:14:50.539; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 37832ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-Qwb2MF/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 33941 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33941 (pid=1801912). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 33942 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33942 (pid=1802021). Happy searching!
#
#     INFO  - 2023-10-15 10:15:16.682; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 10:15:16.688; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 10:15:17.607; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3c0fae6c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-Qwb2MF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Qwb2MF/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 10:15:17.614; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-Qwb2MF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Qwb2MF/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 10:15:17.614; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(ca,h=[localhost],a=[],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-Qwb2MF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Qwb2MF/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:15:17.665 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 2B 04 85",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:15:02.000 UTC",
#     "not  after"         : "2024-01-13 10:15:02.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 24 A1 C1 3C CA EF D0   5B CF 89 29 E6 AD 20 D5  y$..<...[..).. .
#         0010: 41 E4 A8 A2                                        A...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4A 33 13 EA 3A 1D 94 C2   45 B2 B5 B8 3B 9F C7 49  J3..:...E...;..I
#         0010: C0 F8 D2 AD                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 59 AA AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:14:55.000 UTC",
#     "not  after"         : "2024-01-13 10:14:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 7F 24 EF 26 4B 64 5F   2F E6 AD D8 18 CB 53 91  n.$.&Kd_/.....S.
#         0010: AE DE D8 52                                        ...R
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 24 A1 C1 3C CA EF D0   5B CF 89 29 E6 AD 20 D5  y$..<...[..).. .
#         0010: 41 E4 A8 A2                                        A...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:15:17.669 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6A 7C 3B BC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:14:54.000 UTC",
#     "not  after"         : "2024-01-13 10:14:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 7F 24 EF 26 4B 64 5F   2F E6 AD D8 18 CB 53 91  n.$.&Kd_/.....S.
#         0010: AE DE D8 52                                        ...R
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 59 AA AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:14:55.000 UTC",
#     "not  after"         : "2024-01-13 10:14:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 7F 24 EF 26 4B 64 5F   2F E6 AD D8 18 CB 53 91  n.$.&Kd_/.....S.
#         0010: AE DE D8 52                                        ...R
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 24 A1 C1 3C CA EF D0   5B CF 89 29 E6 AD 20 D5  y$..<...[..).. .
#         0010: 41 E4 A8 A2                                        A...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:15:17.682 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 10:15:18.416 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 10:15:18.416 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 10:15:18.418 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 10:15:18.418 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 10:15:18.431 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 10:15:18.451 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 10:15:18.451 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 10:15:18.458 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 10:15:18.464 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "67 39 2C CA 92 42 27 24 6B D7 EB A0 FB 23 8E CA DA C6 42 40 89 AA 0F EB 44 F7 D5 76 DB F2 42 56",
#   "session id"          : "07 6A 94 7C 10 17 A2 42 01 1A E6 AF E8 ED 27 AF C0 97 9D C8 D2 74 0A 97 03 BF 70 25 31 82 A7 10",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8E 03 84 03 6B 4E A1 AF   26 C8 7F CC 1B 65 44 CB  ....kN..&....eD.
#             0010: CE CB 9E B8 9C 66 21 39   BA 68 DE A6 F5 63 95 67  .....f!9.h...c.g
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.613 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "1B 9A FD EF 8D EB 5E 23 74 6E 40 3B 5A 68 AF E2 58 E1 70 BA B9 28 4C F2 93 F3 9B 50 16 54 C5 82",
#   "session id"          : "07 6A 94 7C 10 17 A2 42 01 1A E6 AF E8 ED 27 AF C0 97 9D C8 D2 74 0A 97 03 BF 70 25 31 82 A7 10",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 87 D6 C9 F0 D2 83 B0 40   F2 C3 16 7C CB 97 D2 5E  .......@.......^
#           0010: B3 D5 EF A6 83 55 3B 25   50 C1 27 B7 EE 6A B6 62  .....U;%P.'..j.b
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.614 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.614 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.618 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.618 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.618 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.618 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.618 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.618 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.619 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.619 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.620 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.621 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.621 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 10:15:18.621 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 10:15:18.622 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.622 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.622 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.636 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.637 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.642 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.647 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.647 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.648 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.648 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.648 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 10:15:18.648 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 10:15:18.648 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.654 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.654 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.654 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.655 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.655 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.656 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 10:15:18.656 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.658 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F 29 09 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 10:14:58.000 UTC",
#       "not  after"         : "2024-01-13 10:14:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 79 24 A1 C1 3C CA EF D0   5B CF 89 29 E6 AD 20 D5  y$..<...[..).. .
#           0010: 41 E4 A8 A2                                        A...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 FC 08 3F 78 A1 A8 1E   5E 48 AA 7D C8 F8 0D 06   ..?x...^H......
#           0010: C7 A8 48 B1                                        ..H.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.659 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.720 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 59 AA AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:14:55.000 UTC",
#     "not  after"         : "2024-01-13 10:14:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 7F 24 EF 26 4B 64 5F   2F E6 AD D8 18 CB 53 91  n.$.&Kd_/.....S.
#         0010: AE DE D8 52                                        ...R
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 24 A1 C1 3C CA EF D0   5B CF 89 29 E6 AD 20 D5  y$..<...[..).. .
#         0010: 41 E4 A8 A2                                        A...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.723 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3B 11 37 9B 76 39 B7 01   C6 FC D5 4C 23 91 16 1C  ;.7.v9.....L#...
#     0010: 72 66 07 2D 93 3A 81 CE   CE BD E1 9C 39 A2 67 4D  rf.-.:......9.gM
#     0020: 16 C2 11 83 FC BF 88 71   8F 91 8F 74 45 E0 BF 75  .......q...tE..u
#     0030: F7 AF E7 36 14 C5 B7 84   7C 1D FA 9C 87 0D F7 7E  ...6............
#     0040: 3D 99 95 8E 4F D0 0C 14   EE 47 FC 3B 78 76 B8 DB  =...O....G.;xv..
#     0050: C5 F8 9D 18 6D 2A 52 41   57 7D 12 B6 51 DA 4E F0  ....m*RAW...Q.N.
#     0060: 75 BF 97 E8 71 1B 17 E4   BC 6E 22 58 88 F0 C3 06  u...q....n"X....
#     0070: AD 0A 17 2F EF E0 1C 39   83 B2 F8 12 47 2F D0 45  .../...9....G/.E
#     0080: 99 E4 C5 1D 63 0B 3E CE   23 BE 86 EC C4 CA 4F E4  ....c.>.#.....O.
#     0090: B4 3B A6 06 17 8C BF 10   E8 86 D5 CF C5 4E D1 6D  .;...........N.m
#     00A0: C3 4E 42 1A BC 11 F8 20   92 A5 68 07 11 4C FD A5  .NB.... ..h..L..
#     00B0: 56 1F EF E5 2B BE C0 74   B0 12 D2 F5 DE DA 1B 49  V...+..t.......I
#     00C0: 4B F5 47 0F 78 1E 2B 17   9C D9 7E A2 11 95 CB 06  K.G.x.+.........
#     00D0: 71 56 22 16 E0 9C 6B 4C   B7 37 D8 2B CD 63 6C 4D  qV"...kL.7.+.clM
#     00E0: 08 37 CD 3D 48 D8 2C CF   8E D5 36 82 FC 7A 1C 90  .7.=H.,...6..z..
#     00F0: 9A 78 67 58 71 00 28 76   85 6E EB 34 DB 23 04 54  .xgXq.(v.n.4.#.T
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.738 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8B E4 1F C6 11 6E 69 DA   B9 E2 A3 A0 F9 DC EF 38  .....ni........8
#     0010: 36 85 AD 2B B6 30 EC 90   6E FB 73 31 CF C2 9C 52  6..+.0..n.s1...R
#     0020: 2B 64 D6 D7 75 9F 6B 23   D7 5D EF 0D A9 5D DA 0B  +d..u.k#.]...]..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 10:15:18.745 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 10:15:18.746 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-

[...truncated too long message...]

 : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4F 56 73 5C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:15:40.000 UTC",
#     "not  after"         : "2024-01-13 10:15:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 70 FB DD 5F BC C1 C5   8B 63 8B 17 20 38 69 73  .p.._....c.. 8is
#         0010: AD EB 50 B9                                        ..P.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 FF 27 08 06 B4 C9 8E   61 F6 66 77 45 FB FC A5  ..'.....a.fwE...
#         0010: 16 8E DD AB                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:16:04.238 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E A5 E2 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:15:31.000 UTC",
#     "not  after"         : "2024-01-13 10:15:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AC 47 D1 C6 89 F5 DD D0   ED 5A D6 EE B5 CF AF DC  .G.......Z......
#         0010: 56 9B 37 39                                        V.79
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "39 7C C6 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:15:34.000 UTC",
#     "not  after"         : "2024-01-13 10:15:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AC 47 D1 C6 89 F5 DD D0   ED 5A D6 EE B5 CF AF DC  .G.......Z......
#         0010: 56 9B 37 39                                        V.79
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 70 FB DD 5F BC C1 C5   8B 63 8B 17 20 38 69 73  .p.._....c.. 8is
#         0010: AD EB 50 B9                                        ..P.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:16:04.251 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 15496ms
ok 65 stop command for single port in 18537ms
not ok 66 status detects locally running solr in 1543ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 269ms
ok 68 listing out files in 3069ms
ok 69 copying files around in 6767ms
ok 70 upconfig in 2816ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1263ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1236ms
not ok 73 Cleanup in 2527ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 6m 29s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/am5c6qwamg35g

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 827 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/827/

All tests passed

Build Log:
[...truncated 1166 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196413ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3467ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-15 07:46:50.895; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:46:50.959; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 2371ms
not ok 8 accept d option with builtin config in 2452ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-15 07:46:55.722; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:46:55.825; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2437ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-15 07:46:58.249; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:46:58.303; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2428ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-15 07:47:00.712; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:47:00.764; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2410ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-15 07:47:03.132; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:47:03.191; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 3517ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-15 07:47:05.530; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:47:06.702; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 3520ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-15 07:47:09.103; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:47:10.285; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 5968ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-15 07:47:20.616; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:47:21.777; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2291ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-15 07:47:24.068; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:47:24.126; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 3644ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-15 07:47:26.646; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:47:27.803; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 3840ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-15 07:47:30.425; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:47:31.667; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 29550ms
ok 19 Check export command in 28296ms
ok 20 export fails on non cloud mode in 9569ms
not ok 21 using curl to extract a single pdf file in 11018ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 34451 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34451 (pid=8718). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-15 07:48:48.134; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:48:50.389; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 24198ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 34451 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34451 (pid=9168). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-15 07:48:59.139; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
#
# ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:35451 within 15000 ms
#
not ok 23 using the bin/solr post tool to crawl web site in 9533ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 34451 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34451 (pid=9709). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-15 07:49:22.999; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:49:24.159; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30438ms
ok 25 start help flag prints help in 175ms
ok 26 stop help flag prints help in 167ms
ok 27 restart help flag prints help in 173ms
ok 28 status help flag prints help in 56ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 168ms
ok 30 create help flag prints help in 164ms
ok 31 createcore help flag prints help in 171ms
ok 32 createcollection help flag prints help in 174ms
ok 33 delete help flag prints help in 168ms
ok 34 version help flag prints help in 58ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 171ms
ok 36 auth help flag prints help in 167ms
ok 37 assert help flag prints help in 975ms
ok 38 post help flag prints help in 1083ms
not ok 39 SQL Module in 14660ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:34451/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-15 07:50:09.201; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:50:13.663; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:34451/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 20291ms
not ok 41 icu collation in analysis-extras module in 8649ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-15 07:50:42.545; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:50:42.605; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1344ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 9920 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9884ms
not ok 44 deploying and undeploying a collection level package in 196370ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 34451 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34451 (pid=13835). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 11527ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 07:54:20.831; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:54:20.887; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-15 07:54:21.903; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:54:21.957; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 12668ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 07:54:32.351; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:54:32.405; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-15 07:54:33.432; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:54:34.604; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3996ms
not ok 48 basic post with a type specified in 1347ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1214ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1218ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1221ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1686ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1368ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1393ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 5715ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-15 07:55:02.770; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:55:05.040; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2410ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-15 07:55:07.420; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:55:07.477; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10602ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:34451/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-2vxyMo%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-15 07:55:18.202; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:55:18.254; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:34451/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-2vxyMo%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12191ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 34451 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34451 (pid=19934). Happy searching!
#
#     INFO  - 2023-10-15 07:55:26.072; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 07:55:26.077; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 07:55:26.523; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-2vxyMo/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2vxyMo/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 07:55:29.266; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 07:55:29.271; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-15 07:55:30.738; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 07:55:30.742; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13611ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 34451 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34451 (pid=20528). Happy searching!
#
#     INFO  - 2023-10-15 07:55:38.331; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 07:55:38.336; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 07:55:38.845; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3c0fae6c(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-2vxyMo/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2vxyMo/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 07:55:38.935; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-2vxyMo/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2vxyMo/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 07:55:38.935; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-2vxyMo/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2vxyMo/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 07:55:42.187; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 07:55:42.192; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-15 07:55:42.651; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-2vxyMo/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2vxyMo/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-15 07:55:42.653; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-2vxyMo/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2vxyMo/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 07:55:43.770; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 07:55:43.775; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 07:55:44.270; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@21ec5d87[provider=null,keyStore=file:///tmp/bats-run-2vxyMo/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2vxyMo/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 07:55:44.271; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@21ec5d87[provider=null,keyStore=file:///tmp/bats-run-2vxyMo/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2vxyMo/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10506ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 34451 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34451 (pid=21125). Happy searching!
#
#     INFO  - 2023-10-15 07:55:51.999; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 07:55:52.003; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-15 07:55:54.295; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 07:55:54.306; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 14038ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-15 07:56:03.578; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 07:56:07.334; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-15 07:56:08.801; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 37713ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-2vxyMo/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 34451 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34451 (pid=22855). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 34452 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 34452 (pid=22964). Happy searching!
#
#     INFO  - 2023-10-15 07:56:35.313; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 07:56:35.324; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 07:56:36.554; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-2vxyMo/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2vxyMo/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 07:56:36.557; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-2vxyMo/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2vxyMo/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 07:56:36.558; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(ca,h=[localhost],a=[],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-2vxyMo/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2vxyMo/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 07:56:36.663 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D 7A BD 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:56:20.000 UTC",
#     "not  after"         : "2024-01-13 07:56:20.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 26 44 F7 94 76 BA 3F   13 9D 96 FD DD 77 82 21  .&D..v.?.....w.!
#         0010: 45 48 F8 90                                        EH..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D3 FB A8 00 0B B8 B1 B4   FE 76 67 A1 69 89 A8 7D  .........vg.i...
#         0010: E8 1F 9B 87                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 28 00 E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:56:14.000 UTC",
#     "not  after"         : "2024-01-13 07:56:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DF D3 9F EB 19 CE 82 A4   F0 ED 76 6B 1D 7B 1E AC  ..........vk....
#         0010: 5D AA CA C1                                        ]...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 26 44 F7 94 76 BA 3F   13 9D 96 FD DD 77 82 21  .&D..v.?.....w.!
#         0010: 45 48 F8 90                                        EH..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 07:56:36.667 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 28 00 E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:56:14.000 UTC",
#     "not  after"         : "2024-01-13 07:56:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DF D3 9F EB 19 CE 82 A4   F0 ED 76 6B 1D 7B 1E AC  ..........vk....
#         0010: 5D AA CA C1                                        ]...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 26 44 F7 94 76 BA 3F   13 9D 96 FD DD 77 82 21  .&D..v.?.....w.!
#         0010: 45 48 F8 90                                        EH..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 06 46 B2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:56:12.000 UTC",
#     "not  after"         : "2024-01-13 07:56:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF D3 9F EB 19 CE 82 A4   F0 ED 76 6B 1D 7B 1E AC  ..........vk....
#         0010: 5D AA CA C1                                        ]...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 07:56:36.690 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 07:56:37.019 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 07:56:37.019 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 07:56:37.021 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 07:56:37.021 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 07:56:37.025 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 07:56:37.041 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 07:56:37.041 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 07:56:37.041 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 07:56:37.043 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F1 8C 77 D5 51 64 6F 1B 42 C7 E3 57 E8 D0 CC 27 BC B4 4C 47 47 6E 14 B0 35 6F 54 75 F3 F7 AE B9",
#   "session id"          : "A9 45 42 A7 E7 E3 FA 42 0C A8 19 69 E0 00 4D D0 18 DF 03 90 94 36 92 64 03 52 C4 EF 8F AA 6B 36",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CA 98 02 A8 B8 18 98 6A   50 2D 28 EE B4 EB 3B C3  .......jP-(...;.
#             0010: 47 84 44 9C 4A 46 BF 27   22 07 7F 1E 89 C4 CA 49  G.D.JF.'"......I
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.392 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "DD 06 D1 52 7E 7F F8 9F B6 F1 02 4C DA 6B 1E 83 52 6F 90 E1 DF EA C2 5D A4 EE EF A0 B3 B7 19 AD",
#   "session id"          : "A9 45 42 A7 E7 E3 FA 42 0C A8 19 69 E0 00 4D D0 18 DF 03 90 94 36 92 64 03 52 C4 EF 8F AA 6B 36",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 11 B1 A1 33 61 4B 1E 9F   E3 1E 93 32 5A 0F D6 AE  ...3aK.....2Z...
#           0010: 5E 09 81 CD CB B5 E7 D2   2B B4 F7 86 F3 45 8A 67  ^.......+....E.g
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.392 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.393 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.397 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.397 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.397 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.397 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.397 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.398 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.398 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.405 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.410 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.410 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.411 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.411 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.411 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.411 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.411 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.411 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.411 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 07:56:37.411 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 07:56:37.411 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.411 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.411 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.448 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.454 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.455 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.459 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.459 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.459 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.459 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.459 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.459 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.464 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 07:56:37.464 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 07:56:37.464 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.473 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.473 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.473 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.473 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.474 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.487 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 07:56:37.488 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:56:37.493 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:56:37.493 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:56:37.493 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:56:37.493 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.553 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 A7 99",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 07:56:16.000 UTC",
#       "not  after"         : "2024-01-13 07:56:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B 26 44 F7 94 76 BA 3F   13 9D 96 FD DD 77 82 21  .&D..v.?.....w.!
#           0010: 45 48 F8 90                                        EH..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 33 E9 8B B0 F7 88 C2   E9 C5 27 E7 6D 96 CE 10  .3........'.m...
#           0010: 6D 98 C1 5C                                        m..\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.553 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 07:56:37.950 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 28 00 E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:56:14.000 UTC",
#     "not  after"         : "2024-01-13 07:56:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject publ

[...truncated too long message...]

Id: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A E9 A1 F2 77 F3 CA FB   09 57 F3 46 46 03 FE 35  ....w....W.FF..5
#         0010: F3 14 CC DD                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 07:57:21.051 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 26 CF 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:56:52.000 UTC",
#     "not  after"         : "2024-01-13 07:56:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F EF 71 4A D3 7F 40 8A   00 F8 2A 02 47 95 5A 8A  o.qJ..@...*.G.Z.
#         0010: 52 81 FB 46                                        R..F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA 57 CF 54 B1 0C C9 7C   38 38 ED 44 C5 54 98 D6  .W.T....88.D.T..
#         0010: F7 55 9C A1                                        .U..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 C7 32 49",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:56:50.000 UTC",
#     "not  after"         : "2024-01-13 07:56:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F EF 71 4A D3 7F 40 8A   00 F8 2A 02 47 95 5A 8A  o.qJ..@...*.G.Z.
#         0010: 52 81 FB 46                                        R..F
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 07:57:21.064 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14627ms
ok 65 stop command for single port in 17410ms
not ok 66 status detects locally running solr in 1503ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 247ms
ok 68 listing out files in 6993ms
ok 69 copying files around in 12076ms
ok 70 upconfig in 2808ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1208ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1206ms
not ok 73 Cleanup in 2425ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (5 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 50s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/f3jdo6gm4pdyg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 826 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/826/

All tests passed

Build Log:
[...truncated 1165 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196482ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 8824ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-15 03:45:44.716; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:45:50.278; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1152ms
not ok 8 accept d option with builtin config in 3495ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-15 03:45:53.821; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:45:54.992; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 7891ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-15 03:45:57.341; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:46:02.898; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 3564ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-15 03:46:05.324; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:46:06.489; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 3472ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-15 03:46:08.814; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:46:09.971; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2330ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-15 03:46:12.285; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:46:12.340; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2349ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-15 03:46:14.674; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:46:14.726; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3402ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-15 03:46:23.852; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:46:23.905; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 3466ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-15 03:46:26.246; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:46:27.403; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2325ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-15 03:46:29.702; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:46:29.750; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2337ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-15 03:46:32.053; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:46:32.107; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 25430ms
ok 19 Check export command in 24432ms
ok 20 export fails on non cloud mode in 11685ms
not ok 21 using curl to extract a single pdf file in 13532ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 45951 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45951 (pid=23560). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-15 03:47:45.189; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:47:47.454; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 11904ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 45951 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45951 (pid=24441). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-15 03:47:58.231; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:47:59.386; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 13004ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 45951 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45951 (pid=26329). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-15 03:48:11.245; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:48:12.399; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 32595ms
ok 25 start help flag prints help in 175ms
ok 26 stop help flag prints help in 170ms
ok 27 restart help flag prints help in 174ms
ok 28 status help flag prints help in 55ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 169ms
ok 30 create help flag prints help in 165ms
ok 31 createcore help flag prints help in 167ms
ok 32 createcollection help flag prints help in 173ms
ok 33 delete help flag prints help in 170ms
ok 34 version help flag prints help in 54ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 164ms
ok 36 auth help flag prints help in 164ms
ok 37 assert help flag prints help in 926ms
ok 38 post help flag prints help in 934ms
not ok 39 SQL Module in 9843ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:45951/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-15 03:48:58.971; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:48:59.022; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:45951/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19014ms
not ok 41 icu collation in analysis-extras module in 9741ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-15 03:49:26.646; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:49:27.802; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1336ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10408ms
not ok 44 deploying and undeploying a collection level package in 196284ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 45951 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45951 (pid=31355). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 14542ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 03:53:06.170; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:53:07.323; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-15 03:53:08.334; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:53:10.594; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 14655ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 03:53:20.806; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:53:23.088; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-15 03:53:24.105; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:53:25.274; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 4058ms
not ok 48 basic post with a type specified in 1300ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1229ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1225ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1191ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1232ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1293ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1313ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 6153ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-15 03:53:52.722; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:53:54.980; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 4661ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-15 03:53:57.346; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:53:59.617; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10183ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:45951/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-DeEtRZ%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-15 03:54:09.846; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 03:54:09.900; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:45951/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-DeEtRZ%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12456ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 45951 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45951 (pid=5204). Happy searching!
#
#     INFO  - 2023-10-15 03:54:17.214; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 03:54:17.219; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 03:54:17.736; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@44c79f32(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-DeEtRZ/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-DeEtRZ/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 03:54:20.657; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 03:54:20.662; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-15 03:54:22.171; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 03:54:22.176; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 13758ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 45951 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45951 (pid=5805). Happy searching!
#
#     INFO  - 2023-10-15 03:54:29.813; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 03:54:29.817; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 03:54:30.343; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-DeEtRZ/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-DeEtRZ/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 03:54:30.481; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-DeEtRZ/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-DeEtRZ/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 03:54:30.481; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-DeEtRZ/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-DeEtRZ/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 03:54:33.680; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 03:54:33.685; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-15 03:54:34.142; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@2fd1731c[provider=null,keyStore=file:///tmp/bats-run-DeEtRZ/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-DeEtRZ/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-15 03:54:34.144; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@2fd1731c[provider=null,keyStore=file:///tmp/bats-run-DeEtRZ/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-DeEtRZ/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 03:54:35.259; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 03:54:35.264; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 03:54:35.869; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@21ec5d87[provider=null,keyStore=file:///tmp/bats-run-DeEtRZ/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-DeEtRZ/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 03:54:35.871; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@21ec5d87[provider=null,keyStore=file:///tmp/bats-run-DeEtRZ/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-DeEtRZ/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10379ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 45951 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45951 (pid=6404). Happy searching!
#
#     INFO  - 2023-10-15 03:54:43.583; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 03:54:43.587; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-15 03:54:46.109; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 03:54:46.115; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 14101ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-15 03:54:55.147; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 03:54:59.011; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-15 03:55:00.541; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 39932ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-DeEtRZ/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 45951 [|]   [/]   [-]   [\]  
# Started Solr server on port 45951 (pid=8110). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 45952 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 45952 (pid=8267). Happy searching!
#
#     INFO  - 2023-10-15 03:55:27.031; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 03:55:27.037; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 03:55:27.384; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-DeEtRZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-DeEtRZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 03:55:27.386; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-DeEtRZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-DeEtRZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 03:55:27.386; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(ca,h=[localhost],a=[],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-DeEtRZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-DeEtRZ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 03:55:27.425 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 B6 E1 CD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 03:55:12.000 UTC",
#     "not  after"         : "2024-01-13 03:55:12.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A5 2C 05 00 15 31 29 69   73 74 64 6A A1 B3 B7 D5  .,...1)istdj....
#         0010: 67 7A A5 A7                                        gz..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 E2 A6 41 E8 61 E5 A6   ED E4 BC 49 72 28 21 BD  ...A.a.....Ir(!.
#         0010: A0 50 95 9A                                        .P..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 98 56 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 03:55:06.000 UTC",
#     "not  after"         : "2024-01-13 03:55:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 06 A3 79 74 55 0A FB   02 02 8B 6A BB AC 21 BF  N..ytU.....j..!.
#         0010: 92 FC 07 1D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A5 2C 05 00 15 31 29 69   73 74 64 6A A1 B3 B7 D5  .,...1)istdj....
#         0010: 67 7A A5 A7                                        gz..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 03:55:27.429 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B E8 B9 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 03:55:03.000 UTC",
#     "not  after"         : "2024-01-13 03:55:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 06 A3 79 74 55 0A FB   02 02 8B 6A BB AC 21 BF  N..ytU.....j..!.
#         0010: 92 FC 07 1D                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 98 56 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 03:55:06.000 UTC",
#     "not  after"         : "2024-01-13 03:55:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 06 A3 79 74 55 0A FB   02 02 8B 6A BB AC 21 BF  N..ytU.....j..!.
#         0010: 92 FC 07 1D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A5 2C 05 00 15 31 29 69   73 74 64 6A A1 B3 B7 D5  .,...1)istdj....
#         0010: 67 7A A5 A7                                        gz..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 03:55:27.441 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 03:55:27.603 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 03:55:27.603 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 03:55:27.605 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 03:55:27.605 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 03:55:27.609 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 03:55:27.620 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 03:55:27.620 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 03:55:27.620 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 03:55:27.622 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "9D FB B1 07 DE E4 9B B0 AC E4 11 A8 0F 25 6B 14 2F B1 0A 0C 78 3A 90 9D E4 4E EF 8A 29 48 96 6D",
#   "session id"          : "4D 4B 21 42 E0 EC 5E 5D BB E4 84 78 DC 68 AC 55 FB A4 91 E2 32 60 D9 33 32 5B 62 84 BC 2D F5 3A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D7 7E D2 14 C6 C9 D4 EA   2D 16 81 CF 9C BA 84 F5  ........-.......
#             0010: 93 67 9A 61 A5 B3 BC DD   00 D9 44 7F 45 92 32 6C  .g.a......D.E.2l
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.696 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "57 79 FC 5F 2D 1F 8A C3 55 D0 ED C6 7D 0E CB A4 44 23 6C 5C AF AC 7D A5 EE 5D 69 43 D2 3B 1C FB",
#   "session id"          : "4D 4B 21 42 E0 EC 5E 5D BB E4 84 78 DC 68 AC 55 FB A4 91 E2 32 60 D9 33 32 5B 62 84 BC 2D F5 3A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C1 67 0B DE F7 22 37 84   EF 20 A5 4C 7E 7B 3F CE  .g..."7.. .L..?.
#           0010: A7 6F 3C 15 D3 7C 0D FA   63 98 16 DB 05 BA B1 55  .o<.....c......U
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.697 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.697 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.697 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.698 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.698 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.698 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.698 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.698 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.698 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.698 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.701 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.701 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.701 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.701 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 03:55:27.702 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 03:55:27.702 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.719 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.720 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.724 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.728 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.728 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.728 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.728 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.728 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 03:55:27.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 03:55:27.729 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.736 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.736 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.736 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.736 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.737 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.738 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 03:55:27.738 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.741 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 86 C4 83",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 03:55:08.000 UTC",
#       "not  after"         : "2024-01-13 03:55:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A5 2C 05 00 15 31 29 69   73 74 64 6A A1 B3 B7 D5  .,...1)istdj....
#           0010: 67 7A A5 A7                                        gz..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5C 74 54 4B DE 62 5F DC   AC 3B 94 7F 01 76 9B 23  \tTK.b_..;...v.#
#           0010: A5 5F CA AB                                        ._..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.741 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 03:55:27.775 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 03:55:27.776 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 03:55:27.776 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 03:55:27.776 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 03:55:27.805 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 98 56 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 03:55:06.000 UTC",
#     "not  after"         : "2024-01-13 03:55:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit

[...truncated too long message...]

   }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 03:56:15.309 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C C8 DF B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 03:55:44.000 UTC",
#     "not  after"         : "2024-01-13 03:55:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D DD 45 BA 42 AF 70 CF   23 7D DE A5 70 FE D7 85  M.E.B.p.#...p...
#         0010: B9 CC A3 F1                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 7E 96 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 03:55:46.000 UTC",
#     "not  after"         : "2024-01-13 03:55:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D DD 45 BA 42 AF 70 CF   23 7D DE A5 70 FE D7 85  M.E.B.p.#...p...
#         0010: B9 CC A3 F1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 22 AB 9D FC E5 C8 05   AC 3A F0 87 1A 0F B5 5A  .".......:.....Z
#         0010: 0F 48 14 F0                                        .H..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 03:56:15.320 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14272ms
ok 65 stop command for single port in 17929ms
not ok 66 status detects locally running solr in 3581ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 30904 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20031 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 30904 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20031 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 243ms
ok 68 listing out files in 2773ms
ok 69 copying files around in 6373ms
ok 70 upconfig in 3900ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1205ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1209ms
not ok 73 Cleanup in 4613ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 30904 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20031 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 30904 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20031 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 5m 6s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/xqsxuog3s6r5w

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 825 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/825/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196371ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 5512ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-15 00:29:23.328; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:29:25.589; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 2339ms
not ok 8 accept d option with builtin config in 2321ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-15 00:29:30.252; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:29:30.302; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 3416ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-15 00:29:32.583; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:29:33.738; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2380ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-15 00:29:36.098; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:29:36.151; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 3379ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-15 00:29:38.387; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:29:39.545; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2264ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-15 00:29:41.799; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:29:41.849; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 6640ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-15 00:29:43.997; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:29:48.467; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3406ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-15 00:29:57.059; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:29:57.108; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2271ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-15 00:29:59.398; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:29:59.452; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 4578ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-15 00:30:01.742; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:30:04.016; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2457ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-15 00:30:06.467; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:30:06.532; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 25859ms
ok 19 Check export command in 21881ms
ok 20 export fails on non cloud mode in 8599ms
not ok 21 using curl to extract a single pdf file in 10290ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 40223 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40223 (pid=18158). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-15 00:31:11.180; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:31:13.435; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 10405ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 40223 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40223 (pid=18586). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-15 00:31:21.667; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:31:23.922; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8416ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 40223 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40223 (pid=19065). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-15 00:31:32.262; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:31:32.315; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30725ms
ok 25 start help flag prints help in 164ms
ok 26 stop help flag prints help in 162ms
ok 27 restart help flag prints help in 161ms
ok 28 status help flag prints help in 52ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 158ms
ok 30 create help flag prints help in 161ms
ok 31 createcore help flag prints help in 158ms
ok 32 createcollection help flag prints help in 169ms
ok 33 delete help flag prints help in 167ms
ok 34 version help flag prints help in 55ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 170ms
ok 36 auth help flag prints help in 169ms
ok 37 assert help flag prints help in 959ms
ok 38 post help flag prints help in 936ms
not ok 39 SQL Module in 11394ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:40223/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-15 00:32:16.937; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:32:18.091; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:40223/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 23369ms
not ok 41 icu collation in analysis-extras module in 10698ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-15 00:32:50.452; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:32:52.707; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1259ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9826ms
not ok 44 deploying and undeploying a collection level package in 195996ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 40223 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40223 (pid=23267). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 12149ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 00:36:29.920; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:36:31.094; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-15 00:36:32.065; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:36:32.118; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 15704ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-15 00:36:42.316; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:36:42.371; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-15 00:36:43.354; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:36:47.816; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3670ms
not ok 48 basic post with a type specified in 1351ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1208ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1248ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1321ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1330ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1354ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1360ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 4711ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-15 00:37:15.464; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:37:16.622; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2354ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-15 00:37:18.949; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:37:19.003; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 10261ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:40223/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-FusayV%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-15 00:37:29.325; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 00:37:29.375; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:40223/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-FusayV%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12773ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 40223 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40223 (pid=29479). Happy searching!
#
#     INFO  - 2023-10-15 00:37:36.717; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 00:37:36.722; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 00:37:37.149; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-FusayV/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-FusayV/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 00:37:40.372; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 00:37:40.377; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-15 00:37:41.906; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 00:37:41.911; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12966ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 40223 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40223 (pid=30152). Happy searching!
#
#     INFO  - 2023-10-15 00:37:49.531; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 00:37:49.535; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 00:37:50.084; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-FusayV/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-FusayV/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 00:37:50.252; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-FusayV/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-FusayV/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 00:37:50.252; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-FusayV/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-FusayV/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 00:37:53.072; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 00:37:53.076; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-15 00:37:53.505; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@53499d85[provider=null,keyStore=file:///tmp/bats-run-FusayV/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-FusayV/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-15 00:37:53.507; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@53499d85[provider=null,keyStore=file:///tmp/bats-run-FusayV/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-FusayV/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 00:37:54.886; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 00:37:54.891; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 00:37:55.288; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-FusayV/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-FusayV/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 00:37:55.289; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-FusayV/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-FusayV/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 11018ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 40223 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40223 (pid=30760). Happy searching!
#
#     INFO  - 2023-10-15 00:38:02.855; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 00:38:02.859; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-15 00:38:05.615; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 00:38:05.619; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13650ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-15 00:38:14.483; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-15 00:38:17.948; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-15 00:38:19.497; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 40819ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-FusayV/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40223 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40223 (pid=32459). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40224 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 40224 (pid=32568). Happy searching!
#
#     INFO  - 2023-10-15 00:38:45.169; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 00:38:45.174; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 00:38:45.506; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-FusayV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-FusayV/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 00:38:45.508; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-FusayV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-FusayV/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 00:38:45.509; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-FusayV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-FusayV/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 24:38:45.553 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4F E3 40 7E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:38:31.000 UTC",
#     "not  after"         : "2024-01-13 24:38:31.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 3E C9 45 A7 60 32 73   C6 C8 AA C3 EF F1 93 C7  .>.E.`2s........
#         0010: 05 A9 2F E4                                        ../.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 95 D7 A8 88 43 9A 7F   AE B5 CB 97 C9 06 CA D8  .....C..........
#         0010: F4 EC 6B 67                                        ..kg
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 E7 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:38:25.000 UTC",
#     "not  after"         : "2024-01-13 24:38:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B EB 73 02 62 00 1E 12   AD DD 5A 38 1B 9C 98 9C  ..s.b.....Z8....
#         0010: DB 7B E9 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 3E C9 45 A7 60 32 73   C6 C8 AA C3 EF F1 93 C7  .>.E.`2s........
#         0010: 05 A9 2F E4                                        ../.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 24:38:45.557 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 4F C6 FB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:38:23.000 UTC",
#     "not  after"         : "2024-01-13 24:38:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B EB 73 02 62 00 1E 12   AD DD 5A 38 1B 9C 98 9C  ..s.b.....Z8....
#         0010: DB 7B E9 57                                        ...W
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 E7 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:38:25.000 UTC",
#     "not  after"         : "2024-01-13 24:38:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B EB 73 02 62 00 1E 12   AD DD 5A 38 1B 9C 98 9C  ..s.b.....Z8....
#         0010: DB 7B E9 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 3E C9 45 A7 60 32 73   C6 C8 AA C3 EF F1 93 C7  .>.E.`2s........
#         0010: 05 A9 2F E4                                        ../.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 24:38:45.569 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 24:38:45.917 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:38:45.917 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 24:38:45.919 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 24:38:45.919 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:38:45.923 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:38:45.934 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:38:45.934 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:38:45.935 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:38:45.937 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DF 0D B9 C4 72 89 67 1F 6C 13 D8 CB CD DA 64 FE 96 D6 5C B6 0B 0D 28 49 B5 C7 95 10 8F 91 A1 9D",
#   "session id"          : "1E 94 BA DA 71 CF D8 1B A9 F9 09 EC B9 6A 6C 10 9B A3 61 AC 30 DA 9F BC EA 8E AA 5C C0 8F AF 55",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: AE 80 EE 2B D1 50 6C 34   65 19 FE 85 8A 95 85 35  ...+.Pl4e......5
#             0010: 92 0B C3 C9 94 F9 17 8A   F6 F3 ED 39 B0 62 45 0B  ...........9.bE.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.015 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E1 5B EF BF 65 EC 0B 88 00 80 49 22 3E 9C 31 7E D1 94 47 2F 92 FF 84 AD 00 2B 5E 97 AE 64 AC 04",
#   "session id"          : "1E 94 BA DA 71 CF D8 1B A9 F9 09 EC B9 6A 6C 10 9B A3 61 AC 30 DA 9F BC EA 8E AA 5C C0 8F AF 55",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C1 5A 22 CD 79 1C 5F F1   9B 6D D6 A3 7E 9F 08 AF  .Z".y._..m......
#           0010: 0B E6 50 7C 92 EA F5 46   D1 AA A2 79 C2 28 ED 62  ..P....F...y.(.b
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.015 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.015 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.016 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.016 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.016 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.016 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.016 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.016 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.017 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.017 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.018 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.018 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.018 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:38:46.019 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:38:46.019 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.020 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.020 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.031 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.044 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.047 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.055 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.056 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.056 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.056 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.056 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:38:46.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:38:46.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.058 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.058 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.061 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.062 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.063 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.064 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:38:46.064 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.068 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 97 99 6E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 24:38:27.000 UTC",
#       "not  after"         : "2024-01-13 24:38:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 3E C9 45 A7 60 32 73   C6 C8 AA C3 EF F1 93 C7  .>.E.`2s........
#           0010: 05 A9 2F E4                                        ../.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 69 03 2D 22 F1 E7 52   4C DE 74 B0 3D 13 49 2E  .i.-"..RL.t.=.I.
#           0010: 50 D1 11 85                                        P...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.068 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:38:46.125 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 E7 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:38:25.000 UTC",
#     "not  after"         : "2024-01-13 24:38:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B EB 73 02 62 00 1E 12   AD DD 5A 38 1B 9C 98 9C  ..s.b.....Z8....
#         0010: DB 7B E9 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.

[...truncated too long message...]

 }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 24:39:34.692 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 CD A4 BC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:39:04.000 UTC",
#     "not  after"         : "2024-01-13 24:39:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 69 F9 05 03 D2 27 A2   F7 AE B9 5D 14 D4 41 4E  3i....'....]..AN
#         0010: 6B 6C 8B 58                                        kl.X
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "65 87 C7 43",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:39:06.000 UTC",
#     "not  after"         : "2024-01-13 24:39:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 69 F9 05 03 D2 27 A2   F7 AE B9 5D 14 D4 41 4E  3i....'....]..AN
#         0010: 6B 6C 8B 58                                        kl.X
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 59 FD BA 09 8A 4E E0   D1 3F 96 75 DF A4 C1 94  .Y....N..?.u....
#         0010: 02 EA E3 83                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 24:39:34.704 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14001ms
ok 65 stop command for single port in 16999ms
not ok 66 status detects locally running solr in 3628ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 30904 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20031 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 30904 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20031 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 247ms
ok 68 listing out files in 2775ms
ok 69 copying files around in 13014ms
ok 70 upconfig in 2813ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1204ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1200ms
not ok 73 Cleanup in 4570ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 30904 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20031 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 30904 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20031 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 3m 17s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/ss2wunycdwhas

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 824 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/824/

All tests passed

Build Log:
[...truncated 1166 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 5449ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-14 22:20:14.267; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:20:16.531; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1144ms
not ok 8 accept d option with builtin config in 3408ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-14 22:20:19.974; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:20:21.131; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 3457ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-14 22:20:23.444; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:20:24.616; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 3424ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-14 22:20:26.896; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:20:28.065; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2194ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-14 22:20:30.238; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:20:30.288; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 3379ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-14 22:20:32.513; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:20:33.667; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 5564ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-14 22:20:35.900; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:20:39.254; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 7882ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-14 22:20:47.935; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:20:52.391; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2258ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-14 22:20:54.654; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:20:54.711; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 6751ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-14 22:20:56.956; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:21:01.437; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 3411ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-14 22:21:03.745; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:21:04.915; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 23144ms
ok 19 Check export command in 21963ms
ok 20 export fails on non cloud mode in 9070ms
not ok 21 using curl to extract a single pdf file in 16190ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 34093 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34093 (pid=21108). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-14 22:22:07.780; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:22:15.539; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8211ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 34093 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34093 (pid=21587). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-14 22:22:23.699; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:22:23.751; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 9228ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 34093 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34093 (pid=22009). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-14 22:22:31.861; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:22:33.018; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 29972ms
ok 25 start help flag prints help in 167ms
ok 26 stop help flag prints help in 171ms
ok 27 restart help flag prints help in 166ms
ok 28 status help flag prints help in 53ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 161ms
ok 30 create help flag prints help in 158ms
ok 31 createcore help flag prints help in 172ms
ok 32 createcollection help flag prints help in 167ms
ok 33 delete help flag prints help in 163ms
ok 34 version help flag prints help in 52ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 167ms
ok 36 auth help flag prints help in 163ms
ok 37 assert help flag prints help in 938ms
ok 38 post help flag prints help in 945ms
not ok 39 SQL Module in 9760ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:34093/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-14 22:23:16.848; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:23:16.901; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:34093/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 19096ms
not ok 41 icu collation in analysis-extras module in 9384ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-14 22:23:44.292; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:23:45.445; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1298ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9700ms
not ok 44 deploying and undeploying a collection level package in 196320ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 34093 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34093 (pid=26121). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 15558ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-14 22:27:22.999; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:27:24.157; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-14 22:27:25.120; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:27:28.492; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 13313ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-14 22:27:38.486; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:27:39.661; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-14 22:27:40.641; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:27:41.814; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3805ms
not ok 48 basic post with a type specified in 1297ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1225ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1165ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1174ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1293ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1315ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1620ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 6194ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-14 22:28:09.457; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:28:11.718; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 10067ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-14 22:28:14.007; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:28:21.775; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 9929ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:34093/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-7UtzvG%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-14 22:28:31.784; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:28:31.835; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:34093/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-7UtzvG%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12290ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 34093 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34093 (pid=32526). Happy searching!
#
#     INFO  - 2023-10-14 22:28:39.094; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 22:28:39.099; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 22:28:39.520; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-7UtzvG/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7UtzvG/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-14 22:28:42.388; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-14 22:28:42.392; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-14 22:28:43.935; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 22:28:43.939; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12949ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 34093 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34093 (pid=795). Happy searching!
#
#     INFO  - 2023-10-14 22:28:51.536; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 22:28:51.542; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 22:28:51.913; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6256ac4f(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-7UtzvG/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7UtzvG/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 22:28:52.011; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-7UtzvG/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7UtzvG/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 22:28:52.012; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-7UtzvG/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7UtzvG/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-14 22:28:55.236; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-14 22:28:55.240; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-14 22:28:55.720; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-7UtzvG/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7UtzvG/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-14 22:28:55.721; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-7UtzvG/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7UtzvG/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-14 22:28:56.832; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 22:28:56.836; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-14 22:28:57.260; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-7UtzvG/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7UtzvG/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 22:28:57.262; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-7UtzvG/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-7UtzvG/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10660ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 34093 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34093 (pid=1368). Happy searching!
#
#     INFO  - 2023-10-14 22:29:04.548; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 22:29:04.552; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-14 22:29:06.957; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 22:29:06.965; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13516ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-14 22:29:16.016; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-14 22:29:19.531; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-14 22:29:21.203; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 37313ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-7UtzvG/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 34093 [|]   [/]   [-]   [\]
# Started Solr server on port 34093 (pid=3057). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 34094 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34094 (pid=3181). Happy searching!
#
#     INFO  - 2023-10-14 22:29:47.383; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 22:29:47.387; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 22:29:47.774; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-7UtzvG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7UtzvG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 22:29:47.777; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-7UtzvG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7UtzvG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 22:29:47.779; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-7UtzvG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7UtzvG/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:29:47.822 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D D8 C7 2C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:29:33.000 UTC",
#     "not  after"         : "2024-01-12 22:29:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 96 D9 A8 2F 7F 77 58 07   AE 6F B0 EA D5 B7 51 A7  .../.wX..o....Q.
#         0010: A9 2D A4 D8                                        .-..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 71 A4 82 D7 0C 53 96   CC 01 A2 95 70 30 AB 36  .q....S.....p0.6
#         0010: 61 97 00 0B                                        a...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 3C EB 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:29:26.000 UTC",
#     "not  after"         : "2024-01-12 22:29:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 31 66 7B 66 E4 B8 90   42 36 ED 52 EA 7E C7 C8  .1f.f...B6.R....
#         0010: 16 97 DD 94                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 96 D9 A8 2F 7F 77 58 07   AE 6F B0 EA D5 B7 51 A7  .../.wX..o....Q.
#         0010: A9 2D A4 D8                                        .-..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:29:47.826 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 3C EB 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:29:26.000 UTC",
#     "not  after"         : "2024-01-12 22:29:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 31 66 7B 66 E4 B8 90   42 36 ED 52 EA 7E C7 C8  .1f.f...B6.R....
#         0010: 16 97 DD 94                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 96 D9 A8 2F 7F 77 58 07   AE 6F B0 EA D5 B7 51 A7  .../.wX..o....Q.
#         0010: A9 2D A4 D8                                        .-..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C 7B FB D1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:29:24.000 UTC",
#     "not  after"         : "2024-01-12 22:29:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 31 66 7B 66 E4 B8 90   42 36 ED 52 EA 7E C7 C8  .1f.f...B6.R....
#         0010: 16 97 DD 94                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:29:47.838 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:29:48.228 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:29:48.229 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:29:48.229 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:29:48.229 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 22:29:48.301 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:29:48.301 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 22:29:48.304 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 22:29:48.305 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:29:48.309 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:29:48.319 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:29:48.319 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:29:48.320 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:29:48.322 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E3 E2 B8 6B B9 CE 26 A4 63 B2 4D 7E 9F EB 7A F9 CF 88 04 81 3B 3D 9E 04 D1 3F 74 CD 6B EC 14 42",
#   "session id"          : "CD 52 C4 E2 B0 30 40 95 17 89 64 89 9F 14 3C B2 87 5B D4 24 2B 51 07 FC DE 1F 05 A6 1D 1B B0 46",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 57 CE D1 47 FA FF 7A F1   0E 86 0C CA 83 0F 7E 0E  W..G..z.........
#             0010: 1E DF CC BB CA 3A 74 F1   83 B2 C9 42 4E A1 09 00  .....:t....BN...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.428 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2E 44 67 A6 FE 14 44 AF F8 68 98 D0 4D 88 E2 00 08 65 78 28 55 75 6A 63 E0 83 A0 43 DF 9D 96 82",
#   "session id"          : "CD 52 C4 E2 B0 30 40 95 17 89 64 89 9F 14 3C B2 87 5B D4 24 2B 51 07 FC DE 1F 05 A6 1D 1B B0 46",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 2E C5 27 CF 22 A4 3E 1B   30 3B 3E 54 69 0A CC 08  ..'.".>.0;>Ti...
#           0010: AC D9 8A 16 E0 61 6D 9A   E5 20 40 0C 12 CC DA 41  .....am.. @....A
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.429 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.429 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.429 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.430 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.432 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.432 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.432 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.432 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:29:48.433 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:29:48.433 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.460 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.475 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.478 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.486 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.486 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.486 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.490 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.490 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.490 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.490 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:29:48.490 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:29:48.491 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.492 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.492 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.492 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.493 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.493 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.494 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:29:48.494 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.497 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6A BA FE 64",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:29:29.000 UTC",
#       "not  after"         : "2024-01-12 22:29:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 96 D9 A8 2F 7F 77 58 07   AE 6F B0 EA D5 B7 51 A7  .../.wX..o....Q.
#           0010: A9 2D A4 D8                                        .-..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 05 C6 EA 22 39 2C 52   58 BC C0 EF 5C 11 3C 65  E..."9,RX...\.<e
#           0010: C1 FD 8E 3B                                        ...;
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.497 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.547 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 3C EB 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:29:26.000 UTC",
#     "not  after"         : "2024-01-12 22:29:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 31 66 7B 66 E4 B8 90   42 36 ED 52 EA 7E C7 C8  .1f.f...B6.R....
#         0010: 16 97 DD 94                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 96 D9 A8 2F 7F 77 58 07   AE 6F B0 EA D5 B7 51 A7  .../.wX..o....Q.
#         0010: A9 2D A4 D8                                        .-..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:29:48.550 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 91 3B CB 01 A7 28 4C 86   AD 29 2D B4 C5 CB 0B 20  .;...(L..)-....
#     0010: 1E 00 93 B3 B4 BC EB 92   D5 2D 27 CB DE 5E 44 8A  .........-'..^D.
#     0020: 31 72

[...truncated too long message...]

  }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:30:35.424 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 0E 1A 0F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:30:04.000 UTC",
#     "not  after"         : "2024-01-12 22:30:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 1B 03 16 ED FD 9C 3B   AD 1E 43 EF EF C7 79 D3  .......;..C...y.
#         0010: 27 24 14 BD                                        '$..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 8C DE 1F 4C 94 38 3A   40 69 D1 DC 09 05 97 9F  ....L.8:@i......
#         0010: 69 2C C0 2A                                        i,.*
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E CA F3 86",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:30:02.000 UTC",
#     "not  after"         : "2024-01-12 22:30:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 1B 03 16 ED FD 9C 3B   AD 1E 43 EF EF C7 79 D3  .......;..C...y.
#         0010: 27 24 14 BD                                        '$..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:30:35.435 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14736ms
ok 65 stop command for single port in 17491ms
not ok 66 status detects locally running solr in 3603ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 30904 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20031 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 30904 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20031 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 233ms
ok 68 listing out files in 2823ms
ok 69 copying files around in 10666ms
ok 70 upconfig in 4932ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1200ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1196ms
not ok 73 Cleanup in 4624ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 30904 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20031 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 30904 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20031 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 1s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/lqcd57k6p2fu2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 823 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/823/

All tests passed

Build Log:
[...truncated 1211 lines...]
# ERROR: Error from server at http://localhost:35135/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=javabin&version=2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 46 Random placement plugin using ENV in 17238ms
ok 47 Check help command in 4774ms
ok 48 basic post with a type specified in 5815ms
ok 49 basic post WITHOUT a type specified in 11827ms
ok 50 crawling a directory in 4588ms
ok 51 crawling a web site in 4705ms
ok 52 commit and optimize and delete in 3997ms
ok 53 args mode in 6960ms
ok 54 stdin mode in 3603ms
ok 55 post solr log into solr via script in 10319ms
ok 56 post solr log into solr via cli in 7360ms
ok 57 allowPaths - backup in 17392ms
ok 58 start solr with ssl in 22239ms
not ok 59 use different hostname when not checking peer-name in 26584ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 35135 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35135 (pid=111259). Happy searching!
#
#     INFO  - 2023-10-14 18:21:25.077; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 18:21:25.091; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 18:21:25.796; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-cswxh0/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-cswxh0/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 18:21:25.894; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-cswxh0/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-cswxh0/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 18:21:25.894; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-cswxh0/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-cswxh0/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-14 18:21:40.310; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-14 18:21:40.316; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-14 18:21:41.021; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-cswxh0/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-cswxh0/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:35135/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-14 18:21:42.785; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 18:21:42.789; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-14 18:21:43.678; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 18:21:43.718; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 18181ms
ok 61 start solr with client truststore and security manager in 24189ms
not ok 62 start solr with mTLS needed in 59875ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-cswxh0/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35135 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 35135 (pid=115806). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35136 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 35136 (pid=115974). Happy searching!
#
#     INFO  - 2023-10-14 18:22:57.576; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 18:22:57.589; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 18:22:58.640; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-cswxh0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-cswxh0/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 18:22:58.642; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-cswxh0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-cswxh0/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 18:22:58.642; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-cswxh0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-cswxh0/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 18:22:58.696 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 EE 69 CD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 18:22:39.000 UTC",
#     "not  after"         : "2024-01-12 18:22:39.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#         0010: 48 FD 66 BF                                        H.f.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 AA F7 23 3C 7A F1 F2   19 61 EA A2 BD C8 F9 A3  ...#<z...a......
#         0010: 75 5B E9 BB                                        u[..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B E0 23 21",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 18:22:31.000 UTC",
#     "not  after"         : "2024-01-12 18:22:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 18 B4 62 E2 20 BC 64   47 39 D7 D9 8E 57 66 43  n..b. .dG9...WfC
#         0010: 11 49 FD F9                                        .I..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#         0010: 48 FD 66 BF                                        H.f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 18:22:58.704 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6B A1 A2 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 18:22:29.000 UTC",
#     "not  after"         : "2024-01-12 18:22:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 18 B4 62 E2 20 BC 64   47 39 D7 D9 8E 57 66 43  n..b. .dG9...WfC
#         0010: 11 49 FD F9                                        .I..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B E0 23 21",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 18:22:31.000 UTC",
#     "not  after"         : "2024-01-12 18:22:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 18 B4 62 E2 20 BC 64   47 39 D7 D9 8E 57 66 43  n..b. .dG9...WfC
#         0010: 11 49 FD F9                                        .I..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#         0010: 48 FD 66 BF                                        H.f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 18:22:58.730 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 18:22:59.372 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:22:59.372 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 18:22:59.374 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 18:22:59.374 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:22:59.384 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:22:59.399 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:22:59.399 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:22:59.399 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:22:59.407 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "86 08 FE 21 87 00 B0 88 55 17 AA 4B 5A 60 FD 67 0B 10 DD F4 07 7F B2 F1 93 E5 B4 BB C7 47 11 AC",
#   "session id"          : "D2 7E 21 24 D1 CA 58 96 03 38 2E 06 FB 50 EA 6E E6 65 95 75 E1 8B CC 58 36 C7 E6 9C 9A 54 A5 6B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E3 1B 54 79 04 16 CE E2   15 12 7A F5 3C FE 2D CF  ..Ty......z.<.-.
#             0010: AF EF ED 1B 91 55 40 D8   26 A6 86 63 57 02 E7 0B  .....U@.&..cW...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.553 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8F 8D 0B 0A DC 97 62 05 A1 57 0A F8 0C F8 57 B7 DD B1 62 1C 4E 50 26 02 82 31 C9 0E 72 6D DD B7",
#   "session id"          : "D2 7E 21 24 D1 CA 58 96 03 38 2E 06 FB 50 EA 6E E6 65 95 75 E1 8B CC 58 36 C7 E6 9C 9A 54 A5 6B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 52 14 39 29 B7 BB F2 93   D9 B4 F3 83 8F 80 74 16  R.9)..........t.
#           0010: 60 18 6E 27 58 ED DD 95   49 B6 58 AC F9 15 AD 65  `.n'X...I.X....e
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.553 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.561 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.561 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.561 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.561 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.561 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.562 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.562 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.562 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.562 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.565 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.565 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.565 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:22:59.566 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:22:59.566 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.585 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.586 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.588 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.593 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.593 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.593 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.593 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.593 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.594 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.594 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:22:59.594 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:22:59.594 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.595 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.595 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.595 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.596 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.596 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.597 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:22:59.597 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.610 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 2C 7B 02",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 18:22:34.000 UTC",
#       "not  after"         : "2024-01-12 18:22:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#           0010: 48 FD 66 BF                                        H.f.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5C EB 6B 16 E3 8E 9A F1   B3 28 51 E2 1B FD AA 9B  \.k......(Q.....
#           0010: EC A5 7E A1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.611 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 18:22:59.645 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 18:22:59.645 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 18:22:59.645 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 18:22:59.645 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.925 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B E0 23 21",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 18:22:31.000 UTC",
#     "not  after"         : "2024-01-12 18:22:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 18 B4 62 E2 20 BC 64   47 39 D7 D9 8E 57 66 43  n..b. .dG9...WfC
#         0010: 11 49 FD F9                                        .I..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#         0010: 48 FD 66 BF                                        H.f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.927 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 9C 51 0D D8 3F 5E E8   A8 05 A6 16 A7 0D 98 08  E.Q..?^.........
#     0010: 7B 02 27 47 39 4E 3F 61   07 9F 94 E7 B6 3E 66 86  ..'G9N?a.....>f.
#     0020: 36 30 DF 7B 9B 8F 13 92   3F E7 5A 6B 5F F6 49 74  60......?.Zk_.It
#     0030: 48 3F E5 92 4F F8 1F E3   06 A1 67 6B BC 5F 70 40  H?..O.....gk._p@
#     0040: 26 DE 76 25 19 09 CE 23   D4 D4 32 BD F4 A4 66 5E  &.v%...#..2...f^
#     0050: 25 50 CB E5 13 7E 6B FD   A7 A6 D7 D1 5A A9 10 B2  %P....k.....Z...
#     0060: E9 63 D6 7C 64 0D 8B 2C   A7 E1 12 23 A2 B9 5C 4E  .c..d..,...#..\N
#     0070: 23 37 C0 18 9C 47 83 84   92 27 48 4E D7 09 A3 03  #7...G...'HN....
#     0080: 98 6D 38 DF 3B 0B 49 43   F8 13 56 76 84 EE 7A 79  .m8.;.IC..Vv..zy
#     0090: 74 23 10 A9 AF 3F 80 FC   71 1B 9E 77 29 EA B1 CE  t#...?..q..w)...
#     00A0: EF 3C AA 53 3F F9 2C 58   B2 75 F8 E0 3A 5F 8F DF  .<.S?.,X.u..:_..
#     00B0: 31 10 97 53 64 28 68 9D   88 82 3C 14 7A B9 E1 49  1..Sd(h...<.z..I
#     00C0: 03 D1 68 28 10 D4 00 5C   8C 12 24 B2 BC 95 77 0F  ..h(...\..$...w.
#     00D0: 6C B4 AD 2B 23 9F EA EF   5F 90 93 60 54 C0 6E 12  l..+#..._..`T.n.
#     00E0: C2 A2 1C CB 3C CC 23 5F   FA 5D F9 72 89 77 42 A3  ....<.#_.].r.wB.
#     00F0: 2C B3 62 5F F7 C8 1C 32   38 22 26 30 4D DE DE 6F  ,.b_...28"&0M..o
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.929 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 38 B7 8D 7E F1 A9 45 78   81 90 DE F9 B2 7C B8 54  8.....Ex.......T
#     0010: 35 39 0D 83 4C 8F D9 18   2A 5C 49 90 41 F2 0E B2  59..L...*\I.A...
#     0020: 64 60 A9 C3 2F 43 91 B6   4B 95 48 50 46 36 05 BE  d`../C..K.HPF6..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.931 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 18:22:59.932 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:22:59.932 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 18:22:59.932 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:22:59.932 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 18:22:59.932 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:22:59.932 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.933 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.934 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 EE 69 CD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 18:22:39.000 UTC",
#       "not  after"         : "2024-01-12 18:22:39.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#           0010: 48 FD 66 BF                                        H.f.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 AA F7 23 3C 7A F1 F2   19 61 EA A2 BD C8 F9 A3  ...#<z...a......
#           0010: 75 5B E9 BB                                        u[..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B E0 23 21",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 18:22:31.000 UTC",
#       "not  after"         : "2024-01-12 18:22:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E 18 B4 62 E2 20 BC 64   47 39 D7 D9 8E 57 66 43  n..b. .dG9...WfC
#           0010: 11 49 FD F9                                        .I..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#           0010: 48 FD 66 BF                                        H.f.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.958 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 10 3C DA C7 36 51 CD 52   3D F4 D0 8B 0A B0 56 2B  .<..6Q.R=.....V+
#     0010: 9A 55 C5 1F 0C E0 37 8A   2A 79 F5 B1 C1 4B A0 A9  .U....7.*y...K..
#     0020: A1 91 5B E3 80 FA 6E EB   D0 E0 44 3D ED 2D FF FA  ..[...n...D=.-..
#     0030: EA 4D 41 6A 86 FC 89 46   90 0D 14 81 67 C1 45 AD  .MAj...F....g.E.
#     0040: A0 F3 5C 95 53 5A DF 71   64 81 9D A4 1E 10 D0 C6  ..\.SZ.qd.......
#     0050: 99 61 B4 31 90 4B DA C6   E2 A0 33 AD C7 CD 5B B3  .a.1.K....3...[.
#     0060: F9 73 4C BA 86 B0 98 D0   2D 11 95 F2 56 C3 6C D3  .sL.....-...V.l.
#     0070: 18 B3 2C 17 FD D6 72 FD   BD C8 06 11 A1 7A B7 14  ..,...r......z..
#     0080: 05 8E A2 73 50 9D 4D 23   31 A6 6D E6 CB 49 D9 6C  ...sP.M#1.m..I.l
#     0090: 14 17 0D F2 C7 C0 C0 C3   6D 9B 8E BC 71 D8 9A 48  ........m...q..H
#     00A0: C9 DF 15 F0 07 87 FB E6   CB 91 D8 B3 40 AD AB C5  ............@...
#     00B0: 48 DF 80 E3 59 88 35 B9   63 A2 AA AC F2 F1 F1 4C  H...Y.5.c......L
#     00C0: 03 18 C0 CF 7B 9A 5E 61   A5 5C B2 2E 4E 5F 0E 3A  ......^a.\..N_.:
#     00D0: D4 4C 4F 69 3A 06 FC 9C   30 F4 FD EF DF CA 95 A7  .LOi:...0.......
#     00E0: 37 85 A3 74 2A C7 42 DC   A3 4E D5 50 67 49 60 E6  7..t*.B..N.PgI`.
#     00F0: 92 8C A2 20 95 08 EA 5A   09 AD 86 F2 7F 87 EF 9B  ... ...Z........
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.960 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DE 56 C9 76 56 3C B4 79   E3 EC CA A8 C8 D6 50 41  .V.vV<.y......PA
#     0010: 17 9A 72 56 07 16 7E E5   78 10 3A 0A 9B 6A 0D 02  ..rV....x.:..j..
#     0020: 64 CA 74 9C F3 7B 33 0C   22 AC C3 FA A1 BA 93 6C  d.t...3."......l
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:22:59.961 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:00.026 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "8B EC C4 00 21 3E F0 79 3F E8 1B 4E B3 87 08 00 7E 54 67 85 02 E3 5D 63 AB 62 28 9A 1D 70 D2 8B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 18:23:00.304 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|0E|h2sc-1-thread-2|2023-10-14 18:23:00.308 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 18:23:01.288; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 18:23:01.293; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 18:23:01.796; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-cswxh0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-cswxh0/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 18:23:01.798; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-cswxh0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-cswxh0/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 18:23:01.798; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-cswxh0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-cswxh0/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 18:23:01.836 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 EE 69 CD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 18:22:39.000 UTC",
#     "not  after"         : "2024-01-12 18:22:39.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#         0010: 48 FD 66 BF                                        H.f.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 AA F7 23 3C 7A F1 F2   19 61 EA A2 BD C8 F9 A3  ...#<z...a......
#         0010: 75 5B E9 BB                                        u[..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B E0 23 21",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 18:22:31.000 UTC",
#     "not  after"         : "2024-01-12 18:22:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 18 B4 62 E2 20 BC 64   47 39 D7 D9 8E 57 66 43  n..b. .dG9...WfC
#         0010: 11 49 FD F9                                        .I..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#         0010: 48 FD 66 BF                                        H.f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 18:23:01.839 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6B A1 A2 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 18:22:29.000 UTC",
#     "not  after"         : "2024-01-12 18:22:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 18 B4 62 E2 20 BC 64   47 39 D7 D9 8E 57 66 43  n..b. .dG9...WfC
#         0010: 11 49 FD F9                                        .I..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B E0 23 21",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 18:22:31.000 UTC",
#     "not  after"         : "2024-01-12 18:22:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 18 B4 62 E2 20 BC 64   47 39 D7 D9 8E 57 66 43  n..b. .dG9...WfC
#         0010: 11 49 FD F9                                        .I..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#         0010: 48 FD 66 BF                                        H.f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 18:23:01.851 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 18:23:02.054 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:23:02.054 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 18:23:02.056 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 18:23:02.057 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:23:02.061 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:23:02.073 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:23:02.073 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:23:02.074 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:23:02.076 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "4E 31 B9 9B 80 96 8A 96 53 42 BD B4 C1 D9 28 56 22 6C 24 55 47 D4 63 2D 31 83 ED EF 54 F1 FB 56",
#   "session id"          : "F5 32 6C 6C 17 08 37 45 D4 83 EF 32 A7 B9 C3 DA F7 27 03 C5 CF AF 12 FF 2E 12 47 91 37 59 DA 05",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8C 6C 73 AD A2 2F C6 58   0A 10 E2 A2 59 4E 69 8C  .ls../.X....YNi.
#             0010: 9B 71 F8 B7 6D FC F5 6D   90 E5 C5 42 5C 5C E2 33  .q..m..m...B\\.3
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.168 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "84 21 84 2C A0 34 D4 46 87 BF 5B E2 27 B0 93 C1 B0 87 1B C3 01 BB 7C 86 E6 CD 2A 46 15 5E 87 DE",
#   "session id"          : "F5 32 6C 6C 17 08 37 45 D4 83 EF 32 A7 B9 C3 DA F7 27 03 C5 CF AF 12 FF 2E 12 47 91 37 59 DA 05",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 25 C8 D1 05 46 67 3E BC   40 22 68 FC 65 A9 C8 18  %...Fg>.@"h.e...
#           0010: B9 55 B5 EB 0C 5C 15 C9   C2 1B 26 4C 38 DE 1B 4C  .U...\....&L8..L
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.168 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.169 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.171 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.171 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.171 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.172 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.172 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.172 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.172 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.172 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.176 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.176 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.176 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.176 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.176 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.176 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.177 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.177 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.177 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.177 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:23:02.177 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:23:02.177 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.177 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.177 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.205 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.206 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.207 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.210 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.210 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.211 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.211 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.211 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:23:02.212 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:23:02.212 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.216 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.216 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.216 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.217 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.217 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.218 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:23:02.218 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.473 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 2C 7B 02",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 18:22:34.000 UTC",
#       "not  after"         : "2024-01-12 18:22:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#           0010: 48 FD 66 BF                                        H.f.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5C EB 6B 16 E3 8E 9A F1   B3 28 51 E2 1B FD AA 9B  \.k......(Q.....
#           0010: EC A5 7E A1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.474 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.538 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B E0 23 21",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 18:22:31.000 UTC",
#     "not  after"         : "2024-01-12 18:22:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 18 B4 62 E2 20 BC 64   47 39 D7 D9 8E 57 66 43  n..b. .dG9...WfC
#         0010: 11 49 FD F9                                        .I..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#         0010: 48 FD 66 BF                                        H.f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.542 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 05 FB 7D FA 57 A6 79 C2   88 7F 7C A2 2E 15 D9 BB  ....W.y.........
#     0010: 44 E6 DA 45 53 32 83 92   D8 5E 5F 6C E1 58 50 04  D..ES2...^_l.XP.
#     0020: 24 31 16 CA F3 CA 6E 33   14 20 E0 2C 67 47 4F F5  $1....n3. .,gGO.
#     0030: 57 4F 8C 93 0D 61 38 C5   7B A8 6E CD E4 44 2F 63  WO...a8...n..D/c
#     0040: 1D 91 24 6F 8C 7D 45 7F   64 D1 86 B6 E3 D6 5B 3C  ..$o..E.d.....[<
#     0050: 0C 11 66 61 56 55 55 A6   B3 B2 BD BB E5 1C 6F 2B  ..faVUU.......o+
#     0060: DA FA F3 10 9F 80 2B 74   2F 0A 99 EB D6 7A D9 96  ......+t/....z..
#     0070: 78 D7 F1 2D 91 D9 A8 AC   3A 39 CD 1E 97 46 19 5A  x..-....:9...F.Z
#     0080: 1D AF AA 9D CB 06 57 06   10 BE E9 9B AE 00 D6 B4  ......W.........
#     0090: 3C 43 5C 20 03 06 18 B1   EB 4C 72 08 3F BC 4B 25  <C\ .....Lr.?.K%
#     00A0: 33 B5 65 BE 60 A5 DF 61   B7 29 8D 3F E9 B9 A3 B3  3.e.`..a.).?....
#     00B0: 6A 73 D5 9E 5D 9A 9D BA   18 97 F9 0A DC 24 21 6A  js..]........$!j
#     00C0: 8A 7E 1C D8 BA AB B4 ED   4B 56 A9 45 C7 A0 49 E7  ........KV.E..I.
#     00D0: 3D 43 80 8A 26 BD E8 CB   0D E9 5E 48 B9 45 95 95  =C..&.....^H.E..
#     00E0: AC 00 9A 9B 7B 9D 4D D4   BE 95 08 02 4C 54 37 01  ......M.....LT7.
#     00F0: 60 93 E9 54 3A 4A 2C B8   D3 99 39 C0 58 13 BE B9  `..T:J,...9.X...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.544 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CF 34 92 E2 07 94 99 55   29 E5 7C 66 B1 32 F2 BF  .4.....U)..f.2..
#     0010: 0D A9 F3 7E DD F7 D1 06   21 7A D9 00 D8 2E 9C AF  ........!z......
#     0020: 47 C9 45 33 D5 A3 B4 A8   09 0A 21 7E 47 2D 04 BC  G.E3......!.G-..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.545 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 18:23:02.546 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:23:02.546 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 18:23:02.546 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:23:02.547 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 18:23:02.547 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:23:02.547 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.547 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.549 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 EE 69 CD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 18:22:39.000 UTC",
#       "not  after"         : "2024-01-12 18:22:39.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#           0010: 48 FD 66 BF                                        H.f.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 AA F7 23 3C 7A F1 F2   19 61 EA A2 BD C8 F9 A3  ...#<z...a......
#           0010: 75 5B E9 BB                                        u[..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B E0 23 21",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 18:22:31.000 UTC",
#       "not  after"         : "2024-01-12 18:22:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E 18 B4 62 E2 20 BC 64   47 39 D7 D9 8E 57 66 43  n..b. .dG9...WfC
#           0010: 11 49 FD F9                                        .I..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#           0010: 48 FD 66 BF                                        H.f.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.572 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4A 2F 5F 09 CC F3 6E AA   88 64 BE B0 9F AF 17 59  J/_...n..d.....Y
#     0010: 65 8D 0C B7 EA 0B B1 3C   0A 02 A0 CE CD 09 37 3A  e......<......7:
#     0020: FC 05 1A 80 61 EE BD 67   22 21 6E 95 F0 FE 17 4D  ....a..g"!n....M
#     0030: 82 E5 2A 13 6B 3F 94 19   14 CC 88 2E ED E5 C3 73  ..*.k?.........s
#     0040: 31 30 9B C1 CE 49 9A F7   6D B9 60 A3 04 24 56 F1  10...I..m.`..$V.
#     0050: BE 1F CF 39 C8 AF B0 FE   FC EB 73 1E AD DD 57 84  ...9......s...W.
#     0060: 4D 71 91 A0 84 E1 A7 A0   DA 6E 6D 1F 38 D5 94 7B  Mq.......nm.8...
#     0070: BC 1A 98 80 AE 0D C7 17   01 C3 73 D6 52 1B 96 BF  ..........s.R...
#     0080: 9B AF CD 24 D9 83 1F A5   83 56 A2 70 60 EF C1 AC  ...$.....V.p`...
#     0090: 03 77 AC 31 93 CA 4B 60   E1 CF 49 42 BE E4 11 4C  .w.1..K`..IB...L
#     00A0: B0 C0 0B B0 AE 88 C2 95   1B F6 5D 44 B2 10 B8 6D  ..........]D...m
#     00B0: F0 7D 08 71 D7 02 2B 4B   E5 05 B0 C9 78 2C 8E AA  ...q..+K....x,..
#     00C0: 11 86 FC D8 A1 19 E8 70   4B B9 13 68 F1 AD C4 80  .......pK..h....
#     00D0: 03 1B D0 18 E3 3B 0B 70   35 8D FD C0 9A 18 D6 41  .....;.p5......A
#     00E0: E0 89 F5 B0 4C CB 34 73   C5 82 25 1C 43 3A F7 65  ....L.4s..%.C:.e
#     00F0: 34 2F A8 41 21 0A FF 3A   EC 92 0F E3 58 62 46 AB  4/.A!..:....XbF.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.573 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 23 B3 C6 39 BD 3B 3E D9   E4 B7 70 05 F7 9D E7 7A  #..9.;>...p....z
#     0010: 90 13 F4 CB CF E5 60 53   98 33 78 CB 60 DA 31 09  ......`S.3x.`.1.
#     0020: F2 64 B8 BB B6 A2 12 F6   A3 4F A0 DC FB 49 A4 EB  .d.......O...I..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.574 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:02.640 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "BD AB 1A 66 56 CA 41 6D D6 C7 38 91 D7 E2 05 43 0D 8C 90 9F 88 03 AB C0 77 40 31 AC 8F 61 E3 F1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 18:23:02.691 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 18:23:02.691 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 18:23:02.691 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 18:23:02.691 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-14 18:23:02.963 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 18:23:02.964 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-14 18:23:18.931; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 18:23:19.268 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6B A1 A2 13",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 18:22:29.000 UTC",
#       "not  after"         : "2024-01-12 18:22:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E 18 B4 62 E2 20 BC 64   47 39 D7 D9 8E 57 66 43  n..b. .dG9...WfC
#           0010: 11 49 FD F9                                        .I..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B E0 23 21",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 18:22:31.000 UTC",
#       "not  after"         : "2024-01-12 18:22:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E 18 B4 62 E2 20 BC 64   47 39 D7 D9 8E 57 66 43  n..b. .dG9...WfC
#           0010: 11 49 FD F9                                        .I..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 99 8D 78 33 C4 96 50   6A 00 EA 00 87 7B 63 3D  r..x3..Pj.....c=
#           0010: 48 FD 66 BF                                        H.f.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 18:23:19.282 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 18:23:19.447 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:23:19.447 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 18:23:19.449 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 18:23:19.449 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:23:19.454 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:23:19.469 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:23:19.469 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:23:19.469 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 18:23:19.585 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "3A 3F 63 85 D1 4B A8 11 C0 B6 31 5B 7A CA BF 9C 2E F6 C4 E0 4C 04 A7 81 D0 A5 F5 A2 4B DE 3B 8B",
#     "session id"          : "BE 1C 08 50 F2 24 36 4F FB B2 2C 85 BD DC D1 AC 73 54 4B 77 10 03 FD EE B2 8E 82 61 88 99 F9 CE",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 21 00 3B 6D C3 14 A9 92   F7 3C E0 24 A5 23 64 14  !.;m.....<.$.#d.
#               0010: 32 6F E7 3C 8E FB 26 08   65 2A 4F 64 D2 FA CB 5F  2o.<..&.e*Od..._
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.610 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "0F B5 11 08 6B F1 C9 E5 A7 2D 6E 08 7E 1B 71 71 7A 1D DC 74 91 D1 0B 37 B9 9C AC 43 34 64 0F 48",
#     "session id"          : "BE 1C 08 50 F2 24 36 4F FB B2 2C 85 BD DC D1 AC 73 54 4B 77 10 03 FD EE B2 8E 82 61 88 99 F9 CE",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 40 69 E4 A0 DD 3B 86 DD   54 7C 70 64 54 98 98 F7  @i...;..T.pdT...
#             0010: FE 67 80 F8 27 EB 5F D0   15 D5 E7 B0 BF D9 A7 26  .g..'._........&
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.610 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.610 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.611 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.611 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.611 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.611 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.611 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.611 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.611 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.612 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.614 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.614 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.614 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.615 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.615 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:23:19.615 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:23:19.615 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.615 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.615 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.632 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.634 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.636 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 18:23:19.640 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 1

[...truncated too long message...]

o.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 18:24:35.250 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 18:24:35.300 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 18:24:35.300 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 18:24:35.301 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 18:24:35.301 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35136/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 14771ms
ok 65 stop command for single port in 18261ms
ok 66 status detects locally running solr in 8250ms
ok 67 status does not expose cli parameters to end user in 251ms
ok 68 listing out files in 3048ms
ok 69 copying files around in 6768ms
ok 70 upconfig in 2760ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1236ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1247ms
ok 73 Cleanup in 1274ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 3m 4s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/am2wmtyl6bkwe

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 822 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/822/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196683ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3796ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-14 14:31:04.747; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:31:04.825; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1226ms
not ok 8 accept d option with builtin config in 6819ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-14 14:31:08.507; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:31:12.969; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 3515ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-14 14:31:15.346; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:31:16.507; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 4618ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-14 14:31:18.880; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:31:21.149; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 3412ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-14 14:31:23.412; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:31:24.566; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2279ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-14 14:31:26.846; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:31:26.902; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2274ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-14 14:31:29.132; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:31:29.189; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 6716ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-14 14:31:37.805; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:31:41.161; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2255ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-14 14:31:43.424; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:31:43.474; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 3462ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-14 14:31:45.769; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:31:46.928; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 2362ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-14 14:31:49.304; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:31:49.359; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 25545ms
ok 19 Check export command in 22285ms
ok 20 export fails on non cloud mode in 8941ms
not ok 21 using curl to extract a single pdf file in 8726ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 43619 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43619 (pid=15487). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-14 14:32:55.063; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:32:55.119; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8825ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 43619 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43619 (pid=15911). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-14 14:33:03.904; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:33:03.956; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8770ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 43619 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43619 (pid=16370). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-14 14:33:12.685; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:33:12.735; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30688ms
ok 25 start help flag prints help in 179ms
ok 26 stop help flag prints help in 171ms
ok 27 restart help flag prints help in 173ms
ok 28 status help flag prints help in 55ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 165ms
ok 30 create help flag prints help in 165ms
ok 31 createcore help flag prints help in 168ms
ok 32 createcollection help flag prints help in 167ms
ok 33 delete help flag prints help in 165ms
ok 34 version help flag prints help in 55ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 171ms
ok 36 auth help flag prints help in 170ms
ok 37 assert help flag prints help in 948ms
ok 38 post help flag prints help in 956ms
not ok 39 SQL Module in 13186ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:43619/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-14 14:33:57.451; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:34:00.830; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:43619/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 20051ms
not ok 41 icu collation in analysis-extras module in 12012ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-14 14:34:29.608; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:34:32.968; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1379ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9817ms
not ok 44 deploying and undeploying a collection level package in 196355ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 43619 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43619 (pid=20568). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 18404ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-14 14:38:11.299; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:38:14.661; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-14 14:38:15.700; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:38:19.072; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 12789ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-14 14:38:29.671; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:38:30.845; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-14 14:38:31.878; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:38:31.935; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 3931ms
not ok 48 basic post with a type specified in 1354ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1255ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1255ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1250ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1359ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1342ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1333ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 4861ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-14 14:38:59.404; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:39:00.558; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 3647ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-14 14:39:03.067; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:39:04.241; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 11304ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:43619/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-gzzzQF%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-14 14:39:14.545; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:39:15.702; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:43619/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-gzzzQF%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12724ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 43619 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43619 (pid=26911). Happy searching!
#
#     INFO  - 2023-10-14 14:39:23.117; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 14:39:23.123; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 14:39:23.528; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-gzzzQF/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gzzzQF/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-14 14:39:26.600; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-14 14:39:26.605; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-14 14:39:28.196; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 14:39:28.201; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12949ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 43619 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43619 (pid=27599). Happy searching!
#
#     INFO  - 2023-10-14 14:39:36.033; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 14:39:36.038; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 14:39:36.435; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@c7a975a(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-gzzzQF/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gzzzQF/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 14:39:36.587; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-gzzzQF/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gzzzQF/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 14:39:36.588; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-gzzzQF/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gzzzQF/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-14 14:39:39.414; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-14 14:39:39.418; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-14 14:39:40.110; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-gzzzQF/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gzzzQF/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-14 14:39:40.111; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@59fc684e[provider=null,keyStore=file:///tmp/bats-run-gzzzQF/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gzzzQF/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-14 14:39:41.238; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 14:39:41.242; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-14 14:39:41.646; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-gzzzQF/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gzzzQF/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 14:39:41.648; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6063d80a[provider=null,keyStore=file:///tmp/bats-run-gzzzQF/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-gzzzQF/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10613ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 43619 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43619 (pid=28146). Happy searching!
#
#     INFO  - 2023-10-14 14:39:48.980; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 14:39:48.985; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-14 14:39:51.838; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 14:39:51.848; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13909ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-14 14:40:00.645; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-14 14:40:04.460; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-14 14:40:05.915; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 41331ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-gzzzQF/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 43619 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43619 (pid=29780). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 43620 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43620 (pid=29905). Happy searching!
#
#     INFO  - 2023-10-14 14:40:31.309; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 14:40:31.314; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 14:40:31.716; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-gzzzQF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gzzzQF/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 14:40:32.087; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fd4acee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-gzzzQF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gzzzQF/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 14:40:32.087; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@165b8a71(ca,h=[localhost],a=[],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-gzzzQF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gzzzQF/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 14:40:32.129 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 27 49 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:40:17.000 UTC",
#     "not  after"         : "2024-01-12 14:40:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 54 86 4C 0B B7 2F 7B   01 E0 73 32 5B 0C C7 CF  .T.L../...s2[...
#         0010: F2 8F B3 02                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 28 4B 7C 54 C0 41 57   07 B7 CF 9C A9 C0 83 87  &(K.T.AW........
#         0010: 7D 2A 25 74                                        .*%t
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 0C 50 03",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:40:11.000 UTC",
#     "not  after"         : "2024-01-12 14:40:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DE 27 1F 8E 9E A8 DD C9   FF 98 49 0C 8C 3D EE 9B  .'........I..=..
#         0010: 13 01 27 02                                        ..'.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 54 86 4C 0B B7 2F 7B   01 E0 73 32 5B 0C C7 CF  .T.L../...s2[...
#         0010: F2 8F B3 02                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 14:40:32.132 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 3F B3 D6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:40:09.000 UTC",
#     "not  after"         : "2024-01-12 14:40:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE 27 1F 8E 9E A8 DD C9   FF 98 49 0C 8C 3D EE 9B  .'........I..=..
#         0010: 13 01 27 02                                        ..'.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 0C 50 03",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:40:11.000 UTC",
#     "not  after"         : "2024-01-12 14:40:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DE 27 1F 8E 9E A8 DD C9   FF 98 49 0C 8C 3D EE 9B  .'........I..=..
#         0010: 13 01 27 02                                        ..'.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BD 54 86 4C 0B B7 2F 7B   01 E0 73 32 5B 0C C7 CF  .T.L../...s2[...
#         0010: F2 8F B3 02                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 14:40:32.144 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 14:40:32.306 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:40:32.306 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 14:40:32.308 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 14:40:32.308 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:40:32.313 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:40:32.323 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:40:32.323 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:40:32.323 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:40:32.325 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "09 91 AE E7 A1 C3 E3 57 80 CB F0 6C 25 64 B7 CA 39 4C 39 44 A6 E9 D2 AD 6B A1 EC 97 13 00 9A 89",
#   "session id"          : "EA D6 2B 06 0D 79 A9 C9 9B 46 F6 A5 DB C9 9C BB CD CD D4 7F CC CD 66 FF 7F 16 D7 0C 5C E6 90 AE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 58 9B 9B D0 20 09 64 25   B8 4F 65 EC 5F 12 05 4A  X... .d%.Oe._..J
#             0010: B3 F3 27 EA FF A7 BE 84   9B F4 B3 D0 DE E5 EB 6C  ..'............l
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.410 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8D 32 C0 A5 39 9B 43 8F 36 8E 3E C6 58 7C 78 9B 1E AC 72 7D DB D6 C7 55 78 6A C1 0A D2 C0 B1 37",
#   "session id"          : "EA D6 2B 06 0D 79 A9 C9 9B 46 F6 A5 DB C9 9C BB CD CD D4 7F CC CD 66 FF 7F 16 D7 0C 5C E6 90 AE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 77 4A 02 37 CB 23 D9 63   E2 16 CF 6B 09 43 3F EF  wJ.7.#.c...k.C?.
#           0010: BC 07 91 06 E8 49 B9 E8   34 20 83 3A CB D4 BC 3D  .....I..4 .:...=
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.411 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.411 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.412 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.412 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.413 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.413 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.413 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.413 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.414 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.414 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.417 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.422 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.423 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.424 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.424 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.424 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.424 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:40:32.424 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:40:32.424 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.424 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.424 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.442 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.443 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.444 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.448 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.448 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.448 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.451 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.451 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.451 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.451 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:40:32.452 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:40:32.452 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.454 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.454 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.454 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.456 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.457 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.457 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:40:32.458 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.460 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "51 B8 2B 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 14:40:13.000 UTC",
#       "not  after"         : "2024-01-12 14:40:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 54 86 4C 0B B7 2F 7B   01 E0 73 32 5B 0C C7 CF  .T.L../...s2[...
#           0010: F2 8F B3 02                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 FB F0 EE B7 43 66 4F   C8 B0 14 43 A5 67 86 93  .....CfO...C.g..
#           0010: F0 D7 DD A7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.460 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:40:32.512 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 0C 50 03",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:40:11.000 UTC",
#     "not  after"         : "2024-01-12 14:40:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DE 27 1F 8E 9E A8 DD C9   FF 98 49 0C 8C 3D EE 9B  .'........I..=..
#         0010: 13 01 27 02                                        ..'.
#         ]
#         ]
#       },
#       {
#   

[...truncated too long message...]

 }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 14:41:21.605 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 9D DB 20",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:40:50.000 UTC",
#     "not  after"         : "2024-01-12 14:40:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D EA C2 30 EB EE DD C7   56 01 C4 9C AC 53 18 BD  ]..0....V....S..
#         0010: 1C 71 77 46                                        .qwF
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 62 A3 FD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:40:52.000 UTC",
#     "not  after"         : "2024-01-12 14:40:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D EA C2 30 EB EE DD C7   56 01 C4 9C AC 53 18 BD  ]..0....V....S..
#         0010: 1C 71 77 46                                        .qwF
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 92 18 08 7C 0B 95 52 2B   61 A5 6F F8 D1 2C C4 1B  ......R+a.o..,..
#         0010: 1E DB A4 15                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 14:41:21.616 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14181ms
ok 65 stop command for single port in 17369ms
not ok 66 status detects locally running solr in 3778ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 30904 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20031 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 30904 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20031 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 246ms
ok 68 listing out files in 2852ms
ok 69 copying files around in 16366ms
ok 70 upconfig in 2915ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1213ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1223ms
not ok 73 Cleanup in 4691ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 30904 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20031 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 30904 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20031 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 51s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/vdslizabqpofu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 821 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/821/

All tests passed

Build Log:
[...truncated 1161 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196782ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 3413ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-14 12:24:48.911; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:24:48.966; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 1233ms
not ok 8 accept d option with builtin config in 6776ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-14 12:24:52.578; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:24:57.037; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2438ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-14 12:24:59.428; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:24:59.483; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2477ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-14 12:25:01.928; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:25:01.985; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 5640ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-14 12:25:04.285; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:25:07.670; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 5684ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-14 12:25:09.967; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:25:13.329; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 5615ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-14 12:25:15.657; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:25:19.016; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 3627ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-14 12:25:27.827; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:25:27.880; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 8953ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-14 12:25:30.153; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:25:36.842; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 3488ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-14 12:25:39.192; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:25:40.370; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 4571ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-14 12:25:42.691; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:25:44.951; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 23761ms
ok 19 Check export command in 22908ms
ok 20 export fails on non cloud mode in 8755ms
not ok 21 using curl to extract a single pdf file in 8652ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 35547 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35547 (pid=21531). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-14 12:26:49.268; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:26:49.318; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 8834ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 35547 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35547 (pid=21984). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-14 12:26:58.106; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:26:58.162; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 8912ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 35547 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35547 (pid=22408). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-14 12:27:07.051; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:27:07.112; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 30439ms
ok 25 start help flag prints help in 174ms
ok 26 stop help flag prints help in 165ms
ok 27 restart help flag prints help in 172ms
ok 28 status help flag prints help in 56ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 163ms
ok 30 create help flag prints help in 163ms
ok 31 createcore help flag prints help in 177ms
ok 32 createcollection help flag prints help in 172ms
ok 33 delete help flag prints help in 168ms
ok 34 version help flag prints help in 55ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 170ms
ok 36 auth help flag prints help in 170ms
ok 37 assert help flag prints help in 950ms
ok 38 post help flag prints help in 968ms
not ok 39 SQL Module in 10139ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:35547/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-14 12:27:51.836; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:27:51.892; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:35547/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 22482ms
not ok 41 icu collation in analysis-extras module in 8611ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-14 12:28:23.009; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:28:23.061; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1340ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 10003ms
not ok 44 deploying and undeploying a collection level package in 196539ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 35547 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35547 (pid=26567). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 11494ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-14 12:32:01.454; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:32:01.518; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-14 12:32:02.576; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:32:02.636; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 15785ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-14 12:32:12.899; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:32:15.174; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-14 12:32:16.204; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:32:18.463; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 4007ms
not ok 48 basic post with a type specified in 1338ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1226ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1228ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1243ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1314ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1346ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1364ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 5833ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-14 12:32:45.793; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:32:48.054; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2356ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-14 12:32:50.421; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:32:50.481; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 11274ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:35547/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-RokdGC%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-14 12:33:00.661; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:33:01.841; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:35547/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-RokdGC%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12997ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 35547 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35547 (pid=397). Happy searching!
#
#     INFO  - 2023-10-14 12:33:09.342; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 12:33:09.347; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 12:33:09.750; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-RokdGC/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-RokdGC/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-14 12:33:12.592; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-14 12:33:12.596; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-14 12:33:14.118; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 12:33:14.123; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12845ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 35547 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35547 (pid=1008). Happy searching!
#
#     INFO  - 2023-10-14 12:33:22.311; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 12:33:22.315; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 12:33:22.684; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-RokdGC/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-RokdGC/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 12:33:22.786; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-RokdGC/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-RokdGC/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 12:33:22.787; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-RokdGC/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-RokdGC/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-14 12:33:25.939; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-14 12:33:25.944; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-14 12:33:26.362; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@770d0ea6[provider=null,keyStore=file:///tmp/bats-run-RokdGC/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-RokdGC/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-14 12:33:26.363; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@770d0ea6[provider=null,keyStore=file:///tmp/bats-run-RokdGC/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-RokdGC/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-14 12:33:27.474; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 12:33:27.479; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-14 12:33:27.916; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@24f360b2[provider=null,keyStore=file:///tmp/bats-run-RokdGC/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-RokdGC/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 12:33:27.917; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@24f360b2[provider=null,keyStore=file:///tmp/bats-run-RokdGC/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-RokdGC/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 10796ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 35547 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35547 (pid=1657). Happy searching!
#
#     INFO  - 2023-10-14 12:33:35.324; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 12:33:35.328; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-14 12:33:38.137; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 12:33:38.140; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13387ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-14 12:33:46.890; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-14 12:33:50.366; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-14 12:33:51.825; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 37764ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-RokdGC/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35547 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35547 (pid=3291). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35548 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35548 (pid=3504). Happy searching!
#
#     INFO  - 2023-10-14 12:34:16.284; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 12:34:16.288; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 12:34:16.647; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@743cb8e0(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-RokdGC/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RokdGC/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 12:34:16.649; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-RokdGC/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RokdGC/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 12:34:16.649; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(ca,h=[localhost],a=[],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-RokdGC/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RokdGC/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 12:34:16.688 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 8A 20 66",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:34:04.000 UTC",
#     "not  after"         : "2024-01-12 12:34:04.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 4A E1 A2 5A 18 22 98   61 D3 5E 53 C8 28 10 0B  BJ..Z.".a.^S.(..
#         0010: 49 FB 31 FE                                        I.1.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 2E 4E 78 1D 3A 60 57   32 97 4F DB 55 AC 8B 5C  ..Nx.:`W2.O.U..\
#         0010: D9 BD F9 EC                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A AC 36 BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:33:57.000 UTC",
#     "not  after"         : "2024-01-12 12:33:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 75 4D 52 58 80 15 BD   8E D2 E7 3B 94 05 35 62  .uMRX......;..5b
#         0010: 57 C6 4E FB                                        W.N.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 4A E1 A2 5A 18 22 98   61 D3 5E 53 C8 28 10 0B  BJ..Z.".a.^S.(..
#         0010: 49 FB 31 FE                                        I.1.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 12:34:16.692 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A AC 36 BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:33:57.000 UTC",
#     "not  after"         : "2024-01-12 12:33:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 75 4D 52 58 80 15 BD   8E D2 E7 3B 94 05 35 62  .uMRX......;..5b
#         0010: 57 C6 4E FB                                        W.N.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 4A E1 A2 5A 18 22 98   61 D3 5E 53 C8 28 10 0B  BJ..Z.".a.^S.(..
#         0010: 49 FB 31 FE                                        I.1.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A DE 2F D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:33:55.000 UTC",
#     "not  after"         : "2024-01-12 12:33:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 75 4D 52 58 80 15 BD   8E D2 E7 3B 94 05 35 62  .uMRX......;..5b
#         0010: 57 C6 4E FB                                        W.N.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 12:34:16.704 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 12:34:17.067 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:34:17.067 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 12:34:17.069 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 12:34:17.069 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:34:17.077 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:34:17.089 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:34:17.089 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:34:17.089 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:34:17.091 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "83 F9 54 DA C5 94 1D 4A 60 5E 25 F2 E7 F0 82 BF 6D 2D 3D 1D 80 82 4F 9A 0E 99 BF 0A 87 CE 48 43",
#   "session id"          : "07 9A 28 01 6C 50 0B 23 E6 34 4C 17 F1 07 47 36 C9 D1 1A BE C5 B3 C7 29 2C 98 62 1F C5 7A 3A B9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 24 C1 E5 D3 5C 6D 5C 74   91 F8 9E 00 B8 4D 32 80  $...\m\t.....M2.
#             0010: 8D 4B 8F B6 4A C1 63 AF   4C 9B B4 2F 81 A7 60 27  .K..J.c.L../..`'
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.210 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "67 B6 D9 E2 40 21 26 6E F4 49 BD 2A 2F 60 5D 89 15 93 99 32 B5 76 F2 A5 41 3C CD 90 F9 84 E7 3D",
#   "session id"          : "07 9A 28 01 6C 50 0B 23 E6 34 4C 17 F1 07 47 36 C9 D1 1A BE C5 B3 C7 29 2C 98 62 1F C5 7A 3A B9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 27 6D 1D 07 B8 BD 72 9E   7F B7 60 5A C2 B4 82 59  'm....r...`Z...Y
#           0010: B2 13 7B 4F CA 94 50 C8   D3 D4 93 28 8C 68 9A 79  ...O..P....(.h.y
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.210 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.210 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.211 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.211 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.211 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.211 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.212 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.212 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.212 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.212 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.229 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.230 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.230 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.230 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.230 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.230 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.230 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.230 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.230 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:34:17.230 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:34:17.230 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.231 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.231 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.246 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.251 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.252 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.261 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.261 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.261 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.262 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.262 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.263 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.265 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:34:17.266 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:34:17.266 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.272 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.272 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.272 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.274 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.275 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.276 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:34:17.276 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.283 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 41 48 00",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 12:34:00.000 UTC",
#       "not  after"         : "2024-01-12 12:34:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 4A E1 A2 5A 18 22 98   61 D3 5E 53 C8 28 10 0B  BJ..Z.".a.^S.(..
#           0010: 49 FB 31 FE                                        I.1.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D3 8A 95 62 19 3B 25 B3   EB 81 CE 94 87 17 28 B7  ...b.;%.......(.
#           0010: B2 B5 F5 19                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.283 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:34:17.381 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A AC 36 BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:33:57.000 UTC",
#     "not  after"         : "2024-01-12 12:33:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 75 4D 52 58 80 15 BD   8E D2 E7 3B 94 05 35 62  .uMRX......;..5b
#         0010: 57 C6 4E FB                                        W.N.
#         ]
#         ]
#       },
#       {
#        

[...truncated too long message...]

 }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 12:35:04.637 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "52 EC F7 6F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:34:33.000 UTC",
#     "not  after"         : "2024-01-12 12:34:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 96 70 CD E2 92 D4 19   B3 4A 68 9C 6E 99 B4 49  ..p......Jh.n..I
#         0010: BE 2F 57 87                                        ./W.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 5A CF 98",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:34:35.000 UTC",
#     "not  after"         : "2024-01-12 12:34:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 96 70 CD E2 92 D4 19   B3 4A 68 9C 6E 99 B4 49  ..p......Jh.n..I
#         0010: BE 2F 57 87                                        ./W.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DC E7 2A AD CC 1A E4 6A   31 E9 5E 3A 7E 6B 16 97  ..*....j1.^:.k..
#         0010: FE 63 DA 46                                        .c.F
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 12:35:04.649 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 15377ms
ok 65 stop command for single port in 17421ms
not ok 66 status detects locally running solr in 3775ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 30904 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20031 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 30904 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20031 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 246ms
ok 68 listing out files in 2702ms
ok 69 copying files around in 11097ms
ok 70 upconfig in 2886ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1216ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1213ms
not ok 73 Cleanup in 4793ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 30904 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20031 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 30904 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20031 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 38s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/voeycnm7vcfwo

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 820 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/820/

All tests passed

Build Log:
[...truncated 1164 lines...]
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/4-1
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 5 create for cloud mode in 196872ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create.bats, line 40)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 6 create collection in 5725ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-10-14 10:24:10.542; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:24:12.803; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 7 reject d option with invalid config dir in 2409ms
not ok 8 accept d option with builtin config in 5718ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-10-14 10:24:17.630; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:24:20.990; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 9 accept d option with explicit path to config in 2462ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-10-14 10:24:23.420; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:24:23.476; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 10 accept n option as config name in 2445ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-10-14 10:24:25.889; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:24:25.945; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 11 allow config reuse when n option specifies same config in 2398ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-10-14 10:24:28.319; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:24:28.379; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 12 create multisharded collections when s provided in 2411ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-10-14 10:24:30.746; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:24:30.812; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 13 create replicated collections when rf provided in 2391ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-10-14 10:24:33.172; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:24:33.230; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 14 can delete collections in 4564ms
# (in test file test/test_delete_collection.bats, line 42)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/14-1
# WARN  - 2023-10-14 10:24:41.877; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:24:43.075; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 15 collection delete also deletes zk config in 2424ms
# (in test file test/test_delete_collection.bats, line 50)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/15-2
# WARN  - 2023-10-14 10:24:45.448; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:24:45.503; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 16 deletes accompanying zk config with nondefault name in 2326ms
# (in test file test/test_delete_collection.bats, line 58)
#   `solr create_collection -c "COLL_NAME" -n "NONDEFAULT_CONFIG_NAME"' failed
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/16-3
# WARN  - 2023-10-14 10:24:47.823; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:24:47.890; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 17 deleteConfig option can opt to leave config in zk in 3495ms
# (in test file test/test_delete_collection.bats, line 66)
#   `solr create_collection -c "COLL_NAME"' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/17-4
# WARN  - 2023-10-14 10:24:50.222; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:24:51.381; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 18 SOLR-16755 test works with noprompt in 25693ms
ok 19 Check export command in 23233ms
ok 20 export fails on non cloud mode in 9315ms
not ok 21 using curl to extract a single pdf file in 9906ms
# (in test file test/test_extraction.bats, line 41)
#   `solr create_collection -c gettingstarted -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 38909 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38909 (pid=308). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c gettingstarted -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/21-1
# WARN  - 2023-10-14 10:25:58.617; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:25:59.785; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 22 using the bin/solr post tool to extract content from pdf in 10666ms
# (in test file test/test_extraction.bats, line 65)
#   `solr create_collection -c content_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 38909 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38909 (pid=795). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c content_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/22-2
# WARN  - 2023-10-14 10:26:08.215; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:26:10.518; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
not ok 23 using the bin/solr post tool to crawl web site in 9496ms
# (in test file test/test_extraction.bats, line 92)
#   `solr create_collection -c website_extraction -d _default' failed
# Waiting up to 180 seconds to see Solr running on port 38909 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38909 (pid=1237). Happy searching!
#
#     WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c website_extraction -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/23-3
# WARN  - 2023-10-14 10:26:18.938; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:26:20.101; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 24 healthcheck on cloud solr in 31123ms
ok 25 start help flag prints help in 175ms
ok 26 stop help flag prints help in 162ms
ok 27 restart help flag prints help in 166ms
ok 28 status help flag prints help in 55ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 168ms
ok 30 create help flag prints help in 162ms
ok 31 createcore help flag prints help in 168ms
ok 32 createcollection help flag prints help in 168ms
ok 33 delete help flag prints help in 165ms
ok 34 version help flag prints help in 55ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 173ms
ok 36 auth help flag prints help in 168ms
ok 37 assert help flag prints help in 956ms
ok 38 post help flag prints help in 952ms
not ok 39 SQL Module in 10268ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 36)
#   `assert_output --partial '"docs":'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "docs":
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:38909/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/39-1
# WARN  - 2023-10-14 10:27:05.587; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:27:05.640; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:38909/solr/COLL_NAME/sql?stmt=select+id+from+COLL_NAME+limit+10&wt=json&version=2.2: Expected mime type in [application/json] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 20236ms
not ok 41 icu collation in analysis-extras module in 11909ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_modules.bats, line 66)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (2 lines):
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/41-3
# WARN  - 2023-10-14 10:27:34.472; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:27:37.827; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 42 package detects no running solr in 1300ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_packages.bats, line 34)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (39 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Package Manager
#   ---------------
#   ./solr package add-repo <repository-name> <repository-url>
#   Add a repository to Solr.
#
#   ./solr package add-key <file-containing-trusted-key>
#   Add a trusted key to Solr.
#
#   ./solr package install <package-name>[:<version>] 
#   Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
#   ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
#   Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
#   ./solr package list-installed
#   Print a list of packages installed in Solr.
#
#   ./solr package list-available
#   Print a list of packages available in the repositories.
#
#   ./solr package list-deployed -c <collection>
#   Print a list of packages deployed on a given collection.
#
#   ./solr package list-deployed <package-name>
#   Print a list of collections on which a given package has been deployed.
#
#   ./solr package undeploy <package-name> -collections <comma-separated-collections>
#   Undeploy a package from specified collection(s)
#
#   ./solr package uninstall <package-name>:<version>
#   Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
#   Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#         (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/42-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Package Manager
# ---------------
# ./solr package add-repo <repository-name> <repository-url>
# Add a repository to Solr.
#
# ./solr package add-key <file-containing-trusted-key>
# Add a trusted key to Solr.
#
# ./solr package install <package-name>[:<version>] 
# Install a package into Solr. This copies over the artifacts from the repository into Solr's internal package store and sets up classloader for this package to be used.
#
# ./solr package deploy <package-name>[:<version>] [-y] [--update] -collections <comma-separated-collections> [-p <param1>=<val1> -p <param2>=<val2> ...] 
# Bootstraps a previously installed package into the specified collections. It the package accepts parameters for its setup commands, they can be specified (as per package documentation).
#
# ./solr package list-installed
# Print a list of packages installed in Solr.
#
# ./solr package list-available
# Print a list of packages available in the repositories.
#
# ./solr package list-deployed -c <collection>
# Print a list of packages deployed on a given collection.
#
# ./solr package list-deployed <package-name>
# Print a list of collections on which a given package has been deployed.
#
# ./solr package undeploy <package-name> -collections <comma-separated-collections>
# Undeploy a package from specified collection(s)
#
# ./solr package uninstall <package-name>:<version>
# Uninstall an unused package with specified version from Solr. Both package name and version are required.
#
#
# Note: (a) Please add '-solrUrl http://host:port' parameter if needed (usually on Windows).
#       (b) Please make sure that all Solr nodes are started with '-Denable.packages=true' parameter.
ok 43 lifecycle of package in 9727ms
not ok 44 deploying and undeploying a collection level package in 196475ms
# (in test file test/test_packages.bats, line 53)
#   `solr create_collection -c foo-1.2' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c foo-1.2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/44-3
# Last output:
# Waiting up to 180 seconds to see Solr running on port 38909 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38909 (pid=5405). Happy searching!
#
#     
not ok 45 Affinity placement plugin using sysprop in 12638ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 36)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-14 10:31:15.964; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:31:16.020; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/45-1
# WARN  - 2023-10-14 10:31:17.047; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:31:18.200; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 46 Random placement plugin using ENV in 11632ms
# (from function `collection_exists' in file test/bats_helper.bash, line 97,
#  in test file test/test_placement_plugin.bats, line 45)
#   `collection_exists COLL_NAME' failed
# WARN  - 2023-10-14 10:31:28.674; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:31:28.728; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/46-2
# WARN  - 2023-10-14 10:31:29.761; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:31:29.827; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
ok 47 Check help command in 4027ms
not ok 48 basic post with a type specified in 1380ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 58)
#   `assert_output --partial "Created collection 'monitors'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/48-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 49 basic post WITHOUT a type specified in 1265ms
# (in test file test/test_post.bats, line 68)
#   `solr create_collection -c monitors_no_type -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors_no_type -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/49-3
not ok 50 crawling a directory in 1292ms
# (in test file test/test_post.bats, line 98)
#   `solr create_collection -c mixed_content -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c mixed_content -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/50-4
not ok 51 crawling a web site in 1251ms
# (in test file test/test_post.bats, line 111)
#   `solr create_collection -c webcrawl -d _default' failed
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c webcrawl -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/51-5
not ok 52 commit and optimize and delete in 1280ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 128)
#   `assert_output --partial "Created collection 'monitors2'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'monitors2'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #6 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/52-6
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c monitors2 -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 53 args mode in 1344ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 142)
#   `assert_output --partial "Created collection 'test_args'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_args'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #7 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/53-7
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_args -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 54 stdin mode in 1328ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_post.bats, line 169)
#   `assert_output --partial "Created collection 'test_stdin'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test_stdin'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #8 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/54-8
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c test_stdin -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 55 post solr log into solr via script in 3880ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 43)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/55-1
# WARN  - 2023-10-14 10:31:57.579; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:31:57.632; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 56 post solr log into solr via cli in 2398ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_postlogs.bats, line 55)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (4 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
#   ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/56-2
# WARN  - 2023-10-14 10:31:59.982; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:32:00.037; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 8983 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Server refused connection at: http://localhost:8983/solr/admin/info/system
not ok 57 allowPaths - backup in 12541ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_security_manager.bats, line 47)
#   `assert_output --partial '"status":0'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   "status":0
# output (2 lines):
#
#   ERROR: Error from server at http://localhost:38909/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-yNp1Aj%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/57-1
# WARN  - 2023-10-14 10:32:10.415; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:32:12.676; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# Last output:
#
# ERROR: Error from server at http://localhost:38909/solr/admin/collections?action=BACKUP&name=test&collection=COLL_NAME&location=file%3A%2F%2F%2Ftmp%2Fbats-run-yNp1Aj%2Ftest%2F57%2Fbackup-dir&wt=json&version=2.2: Collection 'COLL_NAME' does not exist, no action taken.
not ok 58 start solr with ssl in 12520ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 57)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 38909 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38909 (pid=11792). Happy searching!
#
#     INFO  - 2023-10-14 10:32:20.103; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 10:32:20.108; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 10:32:20.496; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(solr-ssl,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-yNp1Aj/test/58/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yNp1Aj/test/58/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (6 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-14 10:32:23.436; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-14 10:32:23.442; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/58-1
# Last output:
# INFO  - 2023-10-14 10:32:24.982; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 10:32:24.986; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 59 use different hostname when not checking peer-name in 12642ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 95)
#   `assert_output --partial "Created collection 'test'"' failed
# Waiting up to 180 seconds to see Solr running on port 38909 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38909 (pid=12342). Happy searching!
#
#     INFO  - 2023-10-14 10:32:32.588; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 10:32:32.593; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 10:32:32.982; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-yNp1Aj/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yNp1Aj/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 10:32:33.069; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-yNp1Aj/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yNp1Aj/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 10:32:33.069; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@55795845[provider=null,keyStore=file:///tmp/bats-run-yNp1Aj/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yNp1Aj/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (8 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-14 10:32:36.067; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-14 10:32:36.071; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   WARN  - 2023-10-14 10:32:36.498; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-yNp1Aj/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yNp1Aj/test/59/ssl/solr-ssl.keystore.p12]
#   WARN  - 2023-10-14 10:32:36.500; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@6cea706c[provider=null,keyStore=file:///tmp/bats-run-yNp1Aj/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yNp1Aj/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-14 10:32:37.653; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 10:32:37.658; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-14 10:32:38.084; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@21ec5d87[provider=null,keyStore=file:///tmp/bats-run-yNp1Aj/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yNp1Aj/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 10:32:38.085; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@21ec5d87[provider=null,keyStore=file:///tmp/bats-run-yNp1Aj/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-yNp1Aj/test/59/ssl/solr-ssl.keystore.p12]
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 60 start solr with ssl and auth in 11812ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 38909 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38909 (pid=12936). Happy searching!
#
#     INFO  - 2023-10-14 10:32:45.422; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 10:32:45.427; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/60-3
# Last output:
# INFO  - 2023-10-14 10:32:48.655; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 10:32:48.661; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 61 start solr with client truststore and security manager in 13949ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 220)
#   `assert_output --partial "Created collection 'test'"' failed
# Certificate stored in file <solr-ssl.crt>
# Certificate was added to keystore
# [Storing solr-ssl.truststore.p12]
# INFO  - 2023-10-14 10:32:58.198; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'test'
# output (5 lines):
#   WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#            To turn off: bin/solr config -c test -p 8983 -action set-user-property -property update.autoCreateFields -value false
#   INFO  - 2023-10-14 10:33:01.693; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#
#   ERROR: Server refused connection at: https://localhost:8983/solr/admin/info/system
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/61-4
# Last output:
# INFO  - 2023-10-14 10:33:03.513; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 62 start solr with mTLS needed in 41399ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-yNp1Aj/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 38909 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38909 (pid=14562). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 38910 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 38910 (pid=14672). Happy searching!
#
#     INFO  - 2023-10-14 10:33:29.487; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 10:33:29.496; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 10:33:29.886; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-yNp1Aj/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-yNp1Aj/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 10:33:29.888; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-yNp1Aj/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-yNp1Aj/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 10:33:29.888; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(ca,h=[localhost],a=[],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-yNp1Aj/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-yNp1Aj/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 10:33:29.934 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 54 A1 5A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:33:15.000 UTC",
#     "not  after"         : "2024-01-12 10:33:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DB C6 A2 5B 37 F8 44 43   65 A6 8C 47 13 CB E5 85  ...[7.DCe..G....
#         0010: 1D C7 82 95                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 72 51 84 29 11 21 AE   17 2E C3 B8 F4 3C F2 FC  .rQ.).!......<..
#         0010: 1A DE 27 78                                        ..'x
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 58 16 67",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:33:08.000 UTC",
#     "not  after"         : "2024-01-12 10:33:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 0B 03 81 67 02 E0 9E   E4 4F 74 28 83 D4 5F C5  ....g....Ot(.._.
#         0010: 3C 34 3F 4A                                        <4?J
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB C6 A2 5B 37 F8 44 43   65 A6 8C 47 13 CB E5 85  ...[7.DCe..G....
#         0010: 1D C7 82 95                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 10:33:29.938 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 30 BF 85",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:33:06.000 UTC",
#     "not  after"         : "2024-01-12 10:33:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 0B 03 81 67 02 E0 9E   E4 4F 74 28 83 D4 5F C5  ....g....Ot(.._.
#         0010: 3C 34 3F 4A                                        <4?J
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 58 16 67",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:33:08.000 UTC",
#     "not  after"         : "2024-01-12 10:33:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 0B 03 81 67 02 E0 9E   E4 4F 74 28 83 D4 5F C5  ....g....Ot(.._.
#         0010: 3C 34 3F 4A                                        <4?J
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB C6 A2 5B 37 F8 44 43   65 A6 8C 47 13 CB E5 85  ...[7.DCe..G....
#         0010: 1D C7 82 95                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 10:33:29.950 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 10:33:30.100 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 10:33:30.100 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 10:33:30.104 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 10:33:30.104 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 10:33:30.114 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 10:33:30.128 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 10:33:30.129 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 10:33:30.129 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 10:33:30.131 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "90 61 A3 67 27 E7 8A 49 BB 5F 25 2C 23 3A 8C BB CF 0F 16 3C 98 00 A7 11 90 BA D3 CB 18 5C 7D 5F",
#   "session id"          : "49 A7 D4 5D DF D8 F8 3F EA 97 C7 E5 78 53 BD 52 C1 39 2C 70 C8 AE 3E 7E 0A 66 8C BE 0F E7 3D 1C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DF CF 03 E3 AA 44 67 5C   2B 78 FA 11 4A CD A6 A1  .....Dg\+x..J...
#             0010: 9B FA 39 69 95 D2 89 FB   0D 87 93 FF 60 22 5E 58  ..9i........`"^X
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.513 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "EC C3 CE 79 A6 C2 A3 05 ED 76 55 72 B9 5C ED D8 C8 05 66 88 4E C8 A1 83 A7 3D 10 C3 19 56 BA BC",
#   "session id"          : "49 A7 D4 5D DF D8 F8 3F EA 97 C7 E5 78 53 BD 52 C1 39 2C 70 C8 AE 3E 7E 0A 66 8C BE 0F E7 3D 1C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 25 39 A3 0A 78 A4 65 14   85 87 88 F3 F3 1E AA BE  %9..x.e.........
#           0010: 93 CC 44 CD 96 28 08 B4   48 B8 F9 BD DE 51 3A 74  ..D..(..H....Q:t
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.513 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.513 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.514 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.516 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.524 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.527 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.527 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.527 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.527 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.527 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 10:33:30.530 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 10:33:30.530 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.530 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.531 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.540 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.541 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.542 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.547 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.547 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.547 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.547 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.548 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 10:33:30.548 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 10:33:30.548 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.549 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.550 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.550 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.550 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.551 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.551 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 10:33:30.551 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.565 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "44 EA 31 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 10:33:11.000 UTC",
#       "not  after"         : "2024-01-12 10:33:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DB C6 A2 5B 37 F8 44 43   65 A6 8C 47 13 CB E5 85  ...[7.DCe..G....
#           0010: 1D C7 82 95                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 88 FE 93 E0 40 4E FF 0C   97 09 0D D6 19 05 88 54  ....@N.........T
#           0010: C7 38 75 85                                        .8u.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.565 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 10:33:30.647 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 58 16 67",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:33:08.000 UTC",
#     "not  after"         : "2024-01-12 10:33:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 0B 03 81 67 02 E0 9E   E4 4F 74 28 83 D4 5F C5  ....g....Ot(.._.
#         0010: 3C 34 3F 4A                                        <4?J
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5

[...truncated too long message...]

 }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 10:34:19.140 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "23 4A 62 70",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:33:50.000 UTC",
#     "not  after"         : "2024-01-12 10:33:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A9 FB CD E0 7E A5 8A CE   0E 86 53 EE 44 1E 14 A5  ..........S.D...
#         0010: 24 C6 1D 5F                                        $.._
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8A 14 D0 6B 04 65 13 5C   7A 58 67 BA C1 8E 48 9A  ...k.e.\zXg...H.
#         0010: 4B 23 13 56                                        K#.V
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 3A 17 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:33:48.000 UTC",
#     "not  after"         : "2024-01-12 10:33:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A9 FB CD E0 7E A5 8A CE   0E 86 53 EE 44 1E 14 A5  ..........S.D...
#         0010: 24 C6 1D 5F                                        $.._
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 10:34:19.152 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1$1.failed(HttpClient.java:583)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failConnectionPromise(HTTPSessionListenerPromise.java:136)
# 	at org.eclipse.jetty.http2.client.http.HTTPSessionListenerPromise.failed(HTTPSessionListenerPromise.java:51)
# 	at org.eclipse.jetty.util.Promise$1.failed(Promise.java:94)
# 	at org.eclipse.jetty.io.ClientConnector.connectFailed(ClientConnector.java:540)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:456)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 64 SOLR-11740 check 'solr stop' connection in 14331ms
ok 65 stop command for single port in 17870ms
not ok 66 status detects locally running solr in 3891ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 30904 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20031 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/66-1
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 30904 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20031 running on port 8983
# Solr at http://localhost:8983/solr not online.
ok 67 status does not expose cli parameters to end user in 272ms
ok 68 listing out files in 4900ms
ok 69 copying files around in 15215ms
ok 70 upconfig in 5138ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1221ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1208ms
not ok 73 Cleanup in 4630ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (13 lines):
#
#   Found 3 Solr nodes:
#
#   Solr process 9920 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 30904 running on port 8983
#   Solr at http://localhost:8983/solr not online.
#
#
#   Solr process 20031 running on port 8983
#   Solr at http://localhost:8983/solr not online.
# --
#
# Last output:
#
# Found 3 Solr nodes:
#
# Solr process 9920 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 30904 running on port 8983
# Solr at http://localhost:8983/solr not online.
#
#
# Solr process 20031 running on port 8983
# Solr at http://localhost:8983/solr not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 5m 30s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/acx4cq2srozqk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-check-9.4 - Build # 819 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/819/

All tests passed

Build Log:
[...truncated 1229 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40053/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-14 07:07:04.742; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 07:07:04.747; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-14 07:07:05.565; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 07:07:05.633; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 17865ms
ok 61 start solr with client truststore and security manager in 20992ms
not ok 62 start solr with mTLS needed in 54330ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-Mg7oPj/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40053 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40053 (pid=2772878). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40054 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 40054 (pid=2772989). Happy searching!
#
#     INFO  - 2023-10-14 07:08:11.257; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 07:08:11.281; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 07:08:12.635; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6256ac4f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-Mg7oPj/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Mg7oPj/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 07:08:12.638; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-Mg7oPj/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Mg7oPj/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 07:08:12.638; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(ca,h=[localhost],a=[],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-Mg7oPj/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Mg7oPj/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 07:08:12.733 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "17 39 EB 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 07:07:56.000 UTC",
#     "not  after"         : "2024-01-12 07:07:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#         0010: F1 68 03 77                                        .h.w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 E8 CB 91 60 71 91 1F   13 E1 AD 08 55 1C 68 C3  ....`q......U.h.
#         0010: FD 6C 23 84                                        .l#.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 DC AA E3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 07:07:49.000 UTC",
#     "not  after"         : "2024-01-12 07:07:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E3 23 2B 59 25 D1 C9 8C   E0 A8 1A 1F 01 18 30 3A  .#+Y%.........0:
#         0010: F3 4D C2 48                                        .M.H
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#         0010: F1 68 03 77                                        .h.w
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 07:08:12.741 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 DC AA E3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 07:07:49.000 UTC",
#     "not  after"         : "2024-01-12 07:07:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E3 23 2B 59 25 D1 C9 8C   E0 A8 1A 1F 01 18 30 3A  .#+Y%.........0:
#         0010: F3 4D C2 48                                        .M.H
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#         0010: F1 68 03 77                                        .h.w
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 78 29 2E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 07:07:47.000 UTC",
#     "not  after"         : "2024-01-12 07:07:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E3 23 2B 59 25 D1 C9 8C   E0 A8 1A 1F 01 18 30 3A  .#+Y%.........0:
#         0010: F3 4D C2 48                                        .M.H
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 07:08:12.782 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 07:08:13.135 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:13.135 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 07:08:13.139 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 07:08:13.140 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:13.154 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:13.177 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:13.177 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:13.178 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:13.179 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E9 64 4D 5C F3 AA 12 6B F3 4C 2F 08 3E 8E 94 33 10 F4 1E 70 2F A9 09 A4 A1 3F 8E 28 0F 43 9D 9F",
#   "session id"          : "84 06 2B 40 C8 DE 2D 01 55 91 B3 23 09 1A D8 62 2F F6 C6 8F 66 2A 1B 01 2D AC 59 69 B9 3B FE 40",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C2 24 9E AA 1F 7F C4 26   C0 F9 54 91 DD 6E DC 33  .$.....&..T..n.3
#             0010: 86 34 80 C6 E7 C1 8B 50   F6 E2 9D 71 5D AD 90 37  .4.....P...q]..7
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.470 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FA 49 C5 A3 A2 D3 86 47 9D EB 60 9E 44 9F 64 B9 B3 5D F8 B6 60 89 F7 1A A0 49 D8 BB 5A E9 A8 F8",
#   "session id"          : "84 06 2B 40 C8 DE 2D 01 55 91 B3 23 09 1A D8 62 2F F6 C6 8F 66 2A 1B 01 2D AC 59 69 B9 3B FE 40",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A1 07 6C 6A 8F 1A 2A 39   E2 45 AE 87 BB 22 83 8F  ..lj..*9.E..."..
#           0010: 61 EF 51 A0 0D F0 D9 94   4F 71 11 54 A5 09 77 5E  a.Q.....Oq.T..w^
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.470 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.470 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.471 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.472 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.472 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.472 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.472 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.472 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.473 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.476 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.481 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.482 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.482 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.482 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.482 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.483 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.483 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.483 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.483 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:13.483 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:13.484 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.484 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.484 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.494 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.495 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.496 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.499 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.499 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.500 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.500 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.500 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:13.500 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:13.500 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.502 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.502 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.502 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.502 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.510 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.511 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:13.511 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.520 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 BF D0 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 07:07:52.000 UTC",
#       "not  after"         : "2024-01-12 07:07:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#           0010: F1 68 03 77                                        .h.w
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FD 72 89 43 D6 47 34 69   25 F6 7B E5 B7 50 08 50  .r.C.G4i%....P.P
#           0010: 9B 4F 2E F4                                        .O..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.520 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 07:08:13.540 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 07:08:13.540 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 07:08:13.541 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 07:08:13.541 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.599 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 DC AA E3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 07:07:49.000 UTC",
#     "not  after"         : "2024-01-12 07:07:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E3 23 2B 59 25 D1 C9 8C   E0 A8 1A 1F 01 18 30 3A  .#+Y%.........0:
#         0010: F3 4D C2 48                                        .M.H
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#         0010: F1 68 03 77                                        .h.w
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.602 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 20 FD 43 8C C4 B0 B9 9A   DB EE 88 97 67 C6 D9 98   .C.........g...
#     0010: C8 A2 81 94 51 31 75 2D   61 B6 27 E3 80 3C AA D4  ....Q1u-a.'..<..
#     0020: 30 F6 D3 B1 2B 17 C2 0A   AC BB F1 5C 00 7C 07 EF  0...+......\....
#     0030: B7 3B 0A 79 D8 39 7A 98   56 F5 5D D8 5F 48 8F 05  .;.y.9z.V.]._H..
#     0040: B7 BC BF 55 B4 10 B8 CA   4B 5E D0 D2 22 E7 AA CC  ...U....K^.."...
#     0050: C5 EC 14 31 82 0D 58 A2   10 FB C8 16 4B 19 72 3A  ...1..X.....K.r:
#     0060: 80 4D CD 46 B0 91 8D 18   D3 F1 90 E1 A7 6A A6 C2  .M.F.........j..
#     0070: 8D 87 16 73 95 3D 7B 22   A5 BC D1 BE DB E4 4B F3  ...s.=."......K.
#     0080: 80 A0 95 C6 94 4F 43 B6   BD D5 87 DD 1E 74 AA 4B  .....OC......t.K
#     0090: FC A5 77 E0 61 CE 60 15   C3 B5 EA D4 2E D3 66 49  ..w.a.`.......fI
#     00A0: DD 8C 48 B0 38 84 27 F4   5B 68 22 03 8C 5F 0D 57  ..H.8.'.[h".._.W
#     00B0: 9B AA BF 39 6D C5 FF C2   CA D1 75 CF 11 F3 0E B9  ...9m.....u.....
#     00C0: D9 6B 29 D4 40 1F D4 70   E8 EC 35 18 C3 33 1A F8  .k).@..p..5..3..
#     00D0: AA FC 9F E0 6B 8D B5 0B   25 3F 0F 7C 6A 5D E0 34  ....k...%?..j].4
#     00E0: 7A 29 D6 DB D2 F8 84 2D   D6 26 69 81 43 B6 EC 91  z).....-.&i.C...
#     00F0: D0 79 38 46 86 B3 EC E4   F1 70 22 88 A9 B3 23 AB  .y8F.....p"...#.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.604 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 04 40 9A 43 4E 50 5E 80   99 41 D6 D0 54 6E 4F C7  .@.CNP^..A..TnO.
#     0010: 67 21 06 EF 1A D0 06 BB   EB BB 11 B9 BD 02 F6 5E  g!.............^
#     0020: 98 85 2E 3C DB 67 8F FE   F7 D6 07 0F DA 63 70 08  ...<.g.......cp.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.720 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 07:08:13.721 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:13.721 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 07:08:13.721 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:13.721 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 07:08:13.722 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:13.722 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.722 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.881 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "17 39 EB 90",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 07:07:56.000 UTC",
#       "not  after"         : "2024-01-12 07:07:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#           0010: F1 68 03 77                                        .h.w
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 E8 CB 91 60 71 91 1F   13 E1 AD 08 55 1C 68 C3  ....`q......U.h.
#           0010: FD 6C 23 84                                        .l#.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 DC AA E3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 07:07:49.000 UTC",
#       "not  after"         : "2024-01-12 07:07:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E3 23 2B 59 25 D1 C9 8C   E0 A8 1A 1F 01 18 30 3A  .#+Y%.........0:
#           0010: F3 4D C2 48                                        .M.H
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#           0010: F1 68 03 77                                        .h.w
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.910 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 79 72 78 25 23 E8 18 13   7F E3 0A 6C 21 A1 E7 C7  yrx%#......l!...
#     0010: 0E 8A 3C A9 E9 41 D5 92   3C 3C 9A E2 D0 96 97 8E  ..<..A..<<......
#     0020: A5 6F 5E CB B9 00 39 04   2A 2D 39 7B DE 9C 29 8E  .o^...9.*-9...).
#     0030: 30 A5 60 D9 6F 72 54 63   3C D6 FB 7D F0 27 43 EC  0.`.orTc<....'C.
#     0040: 59 39 23 B1 41 A8 0B C4   24 4F 61 66 22 CA CF 12  Y9#.A...$Oaf"...
#     0050: 81 B3 FF 82 D4 C3 F2 BF   A6 F8 14 DD DB 02 10 29  ...............)
#     0060: 36 91 94 4F 8D E6 99 DA   25 B1 79 25 FF AA FA 3F  6..O....%.y%...?
#     0070: 1C B7 BB 73 81 EC 7D 93   FC 3D 1B 76 F8 97 39 0E  ...s.....=.v..9.
#     0080: DA 12 F2 38 C8 BC 2E 8A   AF DE 38 20 AE 1C 61 69  ...8......8 ..ai
#     0090: 9B A4 AF BF 22 94 E2 C9   50 45 78 D5 F8 BD 26 EE  ...."...PEx...&.
#     00A0: 0C 81 FB 7B 7D 42 7E 00   5F ED 62 40 88 FD 6A 03  .....B.._.b@..j.
#     00B0: 59 9C 01 84 9E 84 B6 BA   74 29 15 A7 B8 3E 4A 8A  Y.......t)...>J.
#     00C0: 1F 4C 00 C4 DD 9E 63 0B   8A 8C 8B B0 B1 9D 44 C2  .L....c.......D.
#     00D0: 1A 57 A4 47 6D C0 51 2D   6A DE 03 B5 73 6B 1C E5  .W.Gm.Q-j...sk..
#     00E0: 3D 94 10 6C 0C 9E 25 7B   3F CD 99 1E 6B 41 28 CA  =..l..%.?...kA(.
#     00F0: BD 99 74 B5 04 B9 27 FB   A2 C1 70 7F BE B0 F0 EB  ..t...'...p.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.912 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 94 CA 89 97 48 ED B1 3B   4A 51 1D 69 51 A9 C9 DD  ....H..;JQ.iQ...
#     0010: B3 2B A1 19 68 12 75 2C   3C F5 17 A3 8D 29 44 F3  .+..h.u,<....)D.
#     0020: B7 2E F1 D7 1D 5A BB FF   1F 64 3F 24 67 02 B1 6F  .....Z...d?$g..o
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.912 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:13.985 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F0 C5 C9 3C 57 A0 87 50 BF 03 7F 5D 06 5E 81 EE 79 66 7B 7C DD 9F 22 1B 2E 6C 06 8E 35 18 99 57",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 07:08:14.254 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 07:08:14.255 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 07:08:15.356; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 07:08:15.361; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 07:08:15.850; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-Mg7oPj/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Mg7oPj/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 07:08:15.852; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6175619b(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-Mg7oPj/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Mg7oPj/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 07:08:15.854; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2f058b8a(ca,h=[localhost],a=[],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-Mg7oPj/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Mg7oPj/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 07:08:15.894 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "17 39 EB 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 07:07:56.000 UTC",
#     "not  after"         : "2024-01-12 07:07:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#         0010: F1 68 03 77                                        .h.w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 E8 CB 91 60 71 91 1F   13 E1 AD 08 55 1C 68 C3  ....`q......U.h.
#         0010: FD 6C 23 84                                        .l#.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 DC AA E3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 07:07:49.000 UTC",
#     "not  after"         : "2024-01-12 07:07:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E3 23 2B 59 25 D1 C9 8C   E0 A8 1A 1F 01 18 30 3A  .#+Y%.........0:
#         0010: F3 4D C2 48                                        .M.H
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#         0010: F1 68 03 77                                        .h.w
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 07:08:15.899 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 DC AA E3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 07:07:49.000 UTC",
#     "not  after"         : "2024-01-12 07:07:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E3 23 2B 59 25 D1 C9 8C   E0 A8 1A 1F 01 18 30 3A  .#+Y%.........0:
#         0010: F3 4D C2 48                                        .M.H
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#         0010: F1 68 03 77                                        .h.w
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 78 29 2E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 07:07:47.000 UTC",
#     "not  after"         : "2024-01-12 07:07:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E3 23 2B 59 25 D1 C9 8C   E0 A8 1A 1F 01 18 30 3A  .#+Y%.........0:
#         0010: F3 4D C2 48                                        .M.H
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 07:08:15.911 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 07:08:16.092 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:16.092 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 07:08:16.093 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 07:08:16.094 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:16.099 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:16.111 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:16.111 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:16.111 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:16.113 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "CA 87 EB 9A C1 6F D6 21 85 26 09 E9 CC 86 9F 64 4D 88 A7 AC 90 8E 20 9C 3C 64 B5 9F C3 7E 73 6F",
#   "session id"          : "20 41 00 E2 C0 F7 26 83 B0 F8 05 35 CD CA 28 98 6F 8A B5 29 C1 7B CB 84 92 F4 FE AC 82 7B F2 0B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 92 1D EC 79 1B D6 E7 B3   0A B7 84 B7 0D 9E D7 61  ...y...........a
#             0010: A9 51 5D 21 FA 76 57 14   4B FE 54 BB AD 4A 8F 6C  .Q]!.vW.K.T..J.l
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.215 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "65 ED 61 3F 08 80 EA B0 8D 32 7B 7B 7E 99 BF 8C DC EC 2F DE 1B 4F 07 A8 48 23 D6 3A C1 0F A9 93",
#   "session id"          : "20 41 00 E2 C0 F7 26 83 B0 F8 05 35 CD CA 28 98 6F 8A B5 29 C1 7B CB 84 92 F4 FE AC 82 7B F2 0B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5F 10 33 B4 77 B2 F1 5F   87 96 87 98 CE 8F CC 32  _.3.w.._.......2
#           0010: 16 85 0D C1 F5 BB C0 CC   EB F7 1C ED A0 53 B6 3D  .............S.=
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.215 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.216 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.222 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.222 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.224 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.224 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.224 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.224 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.224 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.224 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.224 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.225 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.225 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.225 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:16.225 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:16.225 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.225 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.225 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.390 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.397 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.410 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.414 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.414 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.415 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.415 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.415 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.415 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.415 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:16.415 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:16.415 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.416 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.417 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.417 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.417 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.429 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.430 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:16.430 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 07:08:16.439 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 07:08:16.440 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 07:08:16.440 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 07:08:16.440 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.444 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 BF D0 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 07:07:52.000 UTC",
#       "not  after"         : "2024-01-12 07:07:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#           0010: F1 68 03 77                                        .h.w
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FD 72 89 43 D6 47 34 69   25 F6 7B E5 B7 50 08 50  .r.C.G4i%....P.P
#           0010: 9B 4F 2E F4                                        .O..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.444 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.817 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 DC AA E3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 07:07:49.000 UTC",
#     "not  after"         : "2024-01-12 07:07:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E3 23 2B 59 25 D1 C9 8C   E0 A8 1A 1F 01 18 30 3A  .#+Y%.........0:
#         0010: F3 4D C2 48                                        .M.H
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#         0010: F1 68 03 77                                        .h.w
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.819 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7B 8F 64 F1 15 45 DB 55   9E 72 CC 72 44 DC 95 53  ..d..E.U.r.rD..S
#     0010: 15 AF 01 A2 B9 7F 4B D1   5E 88 FC 9B F5 4A EC DC  ......K.^....J..
#     0020: EB 68 94 ED F0 B2 B2 B4   44 7F 7F A8 88 08 97 87  .h......D.......
#     0030: C2 5A 2B C6 FB 56 BB C0   C0 DE 4E 83 66 BB 69 F4  .Z+..V....N.f.i.
#     0040: 6E 8A FD 47 ED 0C FE 6D   9A 89 7C D3 92 92 A1 25  n..G...m.......%
#     0050: E6 0E 0B 50 32 2D DE A5   DC AF F3 7A 6D 2A 55 39  ...P2-.....zm*U9
#     0060: C5 8B CF D5 C6 64 47 11   EF DD 03 7D DA 3F 7A CA  .....dG......?z.
#     0070: A1 2D 3C 28 98 FA 31 30   5F 6B CA C7 4B AE 81 91  .-<(..10_k..K...
#     0080: 81 E2 AF 15 F9 1B 67 C7   AA 24 26 10 6D B3 4A F7  ......g..$&.m.J.
#     0090: 9D A9 ED CF 7C 51 25 E8   17 8A 76 46 00 FB 8A 3B  .....Q%...vF...;
#     00A0: 0B 31 1C 3B 71 F4 5C C6   F3 11 C6 71 C2 37 BD 1D  .1.;q.\....q.7..
#     00B0: 0C A3 66 37 8A 03 38 8D   7C 5A 8B 9D C2 E4 4B 72  ..f7..8..Z....Kr
#     00C0: 1C 37 9A 18 FC 83 9E B5   CB ED 75 EE 8D 0B 24 B1  .7........u...$.
#     00D0: D3 9E 58 ED 4C 2F 97 98   7E 73 2D 2A E6 0D B0 58  ..X.L/...s-*...X
#     00E0: 97 F0 6F 0F 86 1A 78 27   68 E7 8F 29 D3 E0 F7 11  ..o...x'h..)....
#     00F0: DB 41 11 E2 EC 81 2F AC   AD 8A D6 87 AE F3 D7 A9  .A..../.........
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.821 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E9 E5 32 52 EC F7 1A 59   10 23 DE 89 2E 8C AA 46  ..2R...Y.#.....F
#     0010: 60 1D 93 9F D5 5F 4A 99   D9 03 BD D4 49 68 EC 28  `...._J.....Ih.(
#     0020: 42 2A 85 ED A0 26 F1 57   C8 52 05 22 10 4F 07 A9  B*...&.W.R.".O..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.823 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 07:08:16.823 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:16.823 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 07:08:16.824 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:16.824 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 07:08:16.824 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:16.824 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.824 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.826 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "17 39 EB 90",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 07:07:56.000 UTC",
#       "not  after"         : "2024-01-12 07:07:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#           0010: F1 68 03 77                                        .h.w
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 E8 CB 91 60 71 91 1F   13 E1 AD 08 55 1C 68 C3  ....`q......U.h.
#           0010: FD 6C 23 84                                        .l#.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 DC AA E3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 07:07:49.000 UTC",
#       "not  after"         : "2024-01-12 07:07:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E3 23 2B 59 25 D1 C9 8C   E0 A8 1A 1F 01 18 30 3A  .#+Y%.........0:
#           0010: F3 4D C2 48                                        .M.H
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#           0010: F1 68 03 77                                        .h.w
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.850 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 30 15 80 1F BD 6F BA 8B   BA 24 53 05 92 78 B2 68  0....o...$S..x.h
#     0010: 7C 6B 46 A8 B7 41 C2 E8   FB BE DD 11 E6 18 B9 91  .kF..A..........
#     0020: FE 9A DC A8 1E C4 54 C6   C5 35 6C 19 54 4B D1 BF  ......T..5l.TK..
#     0030: 8B DF 0B 8C 21 43 DB 24   83 29 20 A4 D3 3B F8 46  ....!C.$.) ..;.F
#     0040: 51 DD 45 2A D4 19 C8 A3   78 59 65 0C D2 9D AA 26  Q.E*....xYe....&
#     0050: FF F7 19 A6 E7 8C 67 A4   50 B9 3C FB C9 46 E9 6C  ......g.P.<..F.l
#     0060: C6 66 AE 2D BA 57 03 FC   3E 98 20 0E A9 8E C0 1A  .f.-.W..>. .....
#     0070: D7 30 49 FB AD 1D 1C A1   8F C6 36 EA 05 53 B1 FF  .0I.......6..S..
#     0080: 34 09 88 95 18 94 50 60   12 1E 16 7B B1 C2 9A 85  4.....P`........
#     0090: BC 15 F3 8D 9E 08 BC 13   1B E2 8E 20 ED 16 85 7B  ........... ....
#     00A0: 58 34 45 39 0E 03 3C 6C   E1 2E CD 45 CE D6 E9 B4  X4E9..<l...E....
#     00B0: 47 49 88 30 B0 95 FC F1   9C 24 C2 93 72 EF 5C A1  GI.0.....$..r.\.
#     00C0: 0F CE C4 D7 C1 18 E6 94   FB 53 8D DB B8 39 45 74  .........S...9Et
#     00D0: 76 42 22 DC EA 85 E0 BF   F6 66 BE 36 67 77 C3 30  vB"......f.6gw.0
#     00E0: D4 71 E5 79 CE 84 52 1D   02 F2 E8 26 ED B2 8E 17  .q.y..R....&....
#     00F0: 80 1E E7 D3 AD E1 FB A2   C4 99 77 44 EA 01 D4 03  ..........wD....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.851 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 12 0B 4E 9D 02 CF 54 24   53 40 5B BF 1A C6 7B BD  ..N...T$S@[.....
#     0010: 0E A0 26 4A 16 5E 55 79   E2 17 9B A6 B9 E2 E9 55  ..&J.^Uy.......U
#     0020: E9 FB DE 0C 29 77 EB 88   2E 60 87 93 57 A1 CA E5  ....)w...`..W...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.851 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:16.900 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "45 B5 04 85 64 76 A0 DA 7A 91 E3 D2 ED 60 53 81 79 46 90 9F 7C 62 12 D2 A9 67 8A D2 82 DF C3 46",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 07:08:17.172 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 07:08:17.172 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-14 07:08:31.808; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 07:08:32.133 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 DC AA E3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 07:07:49.000 UTC",
#       "not  after"         : "2024-01-12 07:07:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E3 23 2B 59 25 D1 C9 8C   E0 A8 1A 1F 01 18 30 3A  .#+Y%.........0:
#           0010: F3 4D C2 48                                        .M.H
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 90 B2 C5 6B CA 72 46 FA   08 A0 27 BC 02 F1 DC 7A  ...k.rF...'....z
#           0010: F1 68 03 77                                        .h.w
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "14 78 29 2E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 07:07:47.000 UTC",
#       "not  after"         : "2024-01-12 07:07:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E3 23 2B 59 25 D1 C9 8C   E0 A8 1A 1F 01 18 30 3A  .#+Y%.........0:
#           0010: F3 4D C2 48                                        .M.H
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 07:08:32.147 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 07:08:32.319 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:32.319 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 07:08:32.321 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 07:08:32.321 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:32.325 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:32.336 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:32.336 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:32.336 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 07:08:32.338 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "90 A3 19 2C 79 41 2A 30 27 65 69 E5 56 42 5C 4E 66 77 0A 60 60 02 A9 2F 97 42 E7 90 9B A5 C0 84",
#     "session id"          : "BD 94 9A F8 66 42 86 92 0E F3 C3 22 E2 CF E2 F1 B2 B8 33 E6 3E 88 12 5D 54 CA DE CD F0 A2 53 1D",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: CF C4 2F 9B E5 3E E4 F0   05 39 B0 D3 2B 44 5B 86  ../..>...9..+D[.
#               0010: 5A 26 86 3A 73 05 E1 DD   73 5B 26 08 E0 59 FC 70  Z&.:s...s[&..Y.p
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.363 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "7F 70 B0 6C 46 29 53 6C 33 E7 4B 51 2F 9B CA 8E 0F EC 52 60 AA A6 8E DF E2 6A 2B C1 5F 3F 59 94",
#     "session id"          : "BD 94 9A F8 66 42 86 92 0E F3 C3 22 E2 CF E2 F1 B2 B8 33 E6 3E 88 12 5D 54 CA DE CD F0 A2 53 1D",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 82 B5 EC 45 07 23 18 5D   3C C3 C5 A1 A8 D0 32 E7  ...E.#.]<.....2.
#             0010: 6C 77 83 A7 EF 66 2F B4   C9 AA 4E DA 98 AE A8 31  lw...f/...N....1
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.364 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.364 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.364 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.365 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.365 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.365 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.365 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.365 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.365 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.365 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.367 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.367 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.367 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.367 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.367 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.367 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.367 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.368 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.368 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.368 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:32.368 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:32.368 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.368 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.368 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.375 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.377 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.378 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.383 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.383 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.383 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.383 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.383 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.383 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.384 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:32.384 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:32.384 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.385 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.385 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.385 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.385 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.386 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.387 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:08:32.387 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 07:08:32.390 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [

[...truncated too long message...]

.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 07:09:48.265 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 07:09:48.311 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 07:09:48.311 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 07:09:48.312 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 07:09:48.312 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40054/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 15284ms
ok 65 stop command for single port in 18208ms
ok 66 status detects locally running solr in 8279ms
ok 67 status does not expose cli parameters to end user in 277ms
ok 68 listing out files in 2466ms
ok 69 copying files around in 7297ms
ok 70 upconfig in 3022ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1221ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1244ms
ok 73 Cleanup in 1287ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 6m 34s
672 actionable tasks: 672 executed

Publishing build scan...
https://ge.apache.org/s/y34k3qp4nugpi

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any